e1b18969c9ac24cf71af43563d44470e5fbcecb24855fe2fae20dde43e308b83ed0985020a68d3ca25341c6191b6613f8887a7bf8d93ace30ae9a9ecab4", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:00 executing program 4: 21:13:00 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xfffffffffffffffd, 0x400000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2008000) fchmod(r1, 0x18) sendfile(r0, r2, 0x0, 0x800000000031) 21:13:00 executing program 4: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000005c0)=@nat={'nat\x00', 0x19, 0x3, 0x0, [0x20000040, 0x0, 0x0, 0x200001c0, 0x200003e8], 0x0, 0x0, 0x0}, 0x5c8) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000d40)=@filter={'filter\x00', 0xe, 0x3, 0x3a8, [0x0, 0x20000680, 0x200008f0, 0x20000ae8], 0x0, &(0x7f0000000640), &(0x7f0000000680)=[{}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x15, 0x31, 0x18, 'bond_slave_0\x00', 'bpq0\x00', 'ip6_vti0\x00', 'veth0_to_team\x00', @remote, [0xff, 0x0, 0xff, 0xff, 0x0, 0xff], @dev={[], 0x1f}, [0xff, 0xff, 0x0, 0x0, 0xff, 0xff], 0xe8, 0x118, 0x148, [@ip6={'ip6\x00', 0x50, {{@mcast2, @loopback, [0xffffff00, 0xff000000, 0xff, 0xffffffff], [0x0, 0xffffff00, 0xffffffff, 0xffffff00], 0x2, 0x16, 0x3, 0x0, 0x4e21, 0x0, 0x4e20, 0x4e22}}}]}, [@common=@AUDIT={'AUDIT\x00', 0x8, {{0x3}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x4efa1fe5}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x5, 0x40, 0x0, 'ip_vti0\x00', 'rose0\x00', 'ip6gretap0\x00', 'syzkaller1\x00', @dev={[], 0xa}, [0xff, 0x0, 0xff, 0xff, 0x0, 0xff], @link_local, [0xff, 0xff, 0xff], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x80, 'system_u:object_r:tzdata_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff}]}, 0x420) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000dc0)={'ipddp0\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}) r0 = syz_open_pts(0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) fsetxattr$security_selinux(r0, &(0x7f00000010c0)='security.selinux\x00', &(0x7f0000001100)='system_u:object_r:devicekit_power_exec_t:s0\x00', 0x2c, 0x3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001140)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000001180)={0x5, 0x0, 0x5f}, 0x10) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000001340)={'filter\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f0000001280)=[{}, {}, {}, {}, {}, {}, {}], 0x0, [{}, {}]}, 0x98) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000001540)={0x3ff, 0xfff}) keyctl$get_persistent(0x16, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000001600)={{0xa, 0x4e24, 0xfffffffffffffffe, @mcast2, 0x100000000}, {0xa, 0x4e24, 0x1f, @dev={0xfe, 0x80, [], 0x10}}, 0x1000, [0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x6, 0x1f]}, 0x5c) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f0000001680)={{0x87, @local, 0x4e23, 0x2, 'lblcr\x00', 0x0, 0x3, 0xf}, {@broadcast, 0x4e24, 0x10000, 0xffffffffffffff01, 0xe34a, 0x1}}, 0x44) write$P9_RSTAT(r1, 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:13:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x65, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x77, &(0x7f0000000240), 0x10) close(r2) close(r1) [ 479.509057] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 479.515494] b_state=0x00000029, b_size=512 [ 479.519732] device loop0 blocksize: 4096 [ 479.528441] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 479.534809] b_state=0x00000029, b_size=512 [ 479.539058] device loop0 blocksize: 4096 [ 479.552501] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 479.558905] b_state=0x00000029, b_size=512 [ 479.563233] device loop0 blocksize: 4096 [ 479.589338] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 479.595850] b_state=0x00000029, b_size=512 [ 479.600110] device loop0 blocksize: 4096 [ 479.712295] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 479.718759] b_state=0x00000029, b_size=512 [ 479.723001] device loop0 blocksize: 4096 [ 479.731266] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 479.737830] b_state=0x00000029, b_size=512 [ 479.742070] device loop0 blocksize: 4096 [ 479.810519] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 479.817498] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 479.823645] b_state=0x00000029, b_size=512 [ 479.827961] device loop0 blocksize: 4096 [ 479.844692] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 479.850951] b_state=0x00000029, b_size=512 [ 479.855284] device loop0 blocksize: 4096 21:13:01 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r2 = getpgrp(0xffffffffffffffff) fcntl$setownex(r1, 0xf, &(0x7f0000000000)={0x3, r2}) ftruncate(r1, 0x2008000) sendfile(r0, r1, 0x0, 0x800000000031) 21:13:01 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000001d00)='p', 0x1) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x8) wait4(0x0, 0x0, 0x0, 0x0) 21:13:01 executing program 1: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000280)='\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0x0) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 21:13:01 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x80000000, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2008000) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendfile(r0, r1, 0x0, 0x800000000031) [ 479.864871] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 479.871205] b_state=0x00000029, b_size=512 [ 479.875522] device loop0 blocksize: 4096 [ 479.896787] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 479.903210] b_state=0x00000029, b_size=512 [ 479.907572] device loop0 blocksize: 4096 21:13:01 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00\x00\x00\x00\x00\x00\x01\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 479.919128] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 479.925340] b_state=0x00000029, b_size=512 [ 479.929677] device loop0 blocksize: 4096 [ 479.997223] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 480.003492] b_state=0x00000029, b_size=512 [ 480.007917] device loop0 blocksize: 4096 [ 480.055554] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 480.061923] b_state=0x00000029, b_size=512 [ 480.066164] device loop0 blocksize: 4096 21:13:01 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="007d79995755c755fb6b0201c5966ac56783d9c47c16d1fd2db9ac618fed18f6784e09babde3abd8d41a432cdb0a78d5847af03a412780854c127fb8830316aee3605c324854b1439569bc2fd6292123c1191ade374c792d2dde35b5cd2c53856a0351cefdc7815d9124b341eceb37df11ef4142572943fa66ab9eda32a4ec71d077fca475566cdf872ea912c7407fcf2f"], 0x6b, 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='9p\x00', 0x4000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@mmap='mmap'}, {@version_L='version=9p2000.L'}], [{@permit_directio='permit_directio'}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'POLICY_CHECK'}}, {@appraise='appraise'}, {@dont_measure='dont_measure'}]}}) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2008000) sendfile(r0, r2, 0x0, 0x800000000031) [ 480.141481] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 480.147983] b_state=0x00000029, b_size=512 [ 480.152231] device loop0 blocksize: 4096 [ 480.172392] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 480.178723] b_state=0x00000029, b_size=512 [ 480.182965] device loop0 blocksize: 4096 21:13:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000001d00)='p', 0x1) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x8) wait4(0x0, 0x0, 0x0, 0x0) [ 480.201856] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 480.208169] b_state=0x00000029, b_size=512 [ 480.212411] device loop0 blocksize: 4096 [ 480.279172] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 480.285439] b_state=0x00000029, b_size=512 [ 480.289785] device loop0 blocksize: 4096 [ 480.370334] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 480.376554] b_state=0x00000029, b_size=512 [ 480.380911] device loop0 blocksize: 4096 [ 480.385008] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 480.391420] b_state=0x00000029, b_size=512 [ 480.395678] device loop0 blocksize: 4096 [ 480.400111] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 480.406388] b_state=0x00000029, b_size=512 [ 480.410744] device loop0 blocksize: 4096 21:13:01 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, 0x0, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 480.415522] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 480.422025] b_state=0x00000029, b_size=512 [ 480.426271] device loop0 blocksize: 4096 21:13:01 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x80000000011a) ftruncate(r1, 0x1) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) sendfile(r0, r1, 0x0, 0x800000000031) 21:13:01 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 480.614057] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 480.620473] b_state=0x00000029, b_size=512 [ 480.624823] device loop0 blocksize: 4096 [ 480.631730] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 480.637907] b_state=0x00000029, b_size=512 [ 480.642262] device loop0 blocksize: 4096 [ 480.662386] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 480.668706] b_state=0x00000029, b_size=512 [ 480.673054] device loop0 blocksize: 4096 [ 480.677527] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 480.683797] b_state=0x00000029, b_size=512 [ 480.688033] device loop0 blocksize: 4096 [ 480.693434] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 480.699761] b_state=0x00000029, b_size=512 [ 480.704282] device loop0 blocksize: 4096 [ 480.715918] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 480.722347] b_state=0x00000029, b_size=512 [ 480.726590] device loop0 blocksize: 4096 [ 480.735941] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 480.742411] b_state=0x00000029, b_size=512 [ 480.746656] device loop0 blocksize: 4096 [ 480.751120] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 480.757433] b_state=0x00000029, b_size=512 [ 480.761675] device loop0 blocksize: 4096 [ 480.767112] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 480.773614] b_state=0x00000029, b_size=512 [ 480.777862] device loop0 blocksize: 4096 [ 480.853537] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 480.859740] b_state=0x00000029, b_size=512 [ 480.864304] device loop0 blocksize: 4096 21:13:02 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x7f}, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00'}) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) read(r1, &(0x7f0000004d00)=""/4096, 0xfffffe91) listxattr(0x0, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000100), 0x0, 0x0, 0x8) write$uinput_user_dev(r1, &(0x7f0000000880)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) 21:13:02 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x4000, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x14000) sendfile(r0, r2, 0x0, 0x800000000031) [ 480.904372] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 480.910660] b_state=0x00000029, b_size=512 [ 480.914999] device loop0 blocksize: 4096 [ 480.927298] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 480.933576] b_state=0x00000029, b_size=512 [ 480.937917] device loop0 blocksize: 4096 21:13:02 executing program 0: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) ioctl(r0, 0x7, &(0x7f000000c280)="12f81b3dfb60a86084946d16e69474a6cf3648064f06740d4e6ccdc5b45d77ae059e0ae36de371dc67787b5b919411f44edb3c21f0ca3d0da4b433e2e5fcbd802cf31d0f57159e023034b858d2e1c9a3e330679b7f9afe1de9a960c4b0df1e1df526e5b3c406b08feb438e0b7b6d849d0322c03b3ad19174d24fe3") r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2008000) sendfile(r1, r2, 0x0, 0x800000000031) recvmmsg(r1, &(0x7f000000c040)=[{{0x0, 0x0, &(0x7f00000013c0)=[{}, {&(0x7f0000000040)=""/22, 0x16}, {&(0x7f0000000080)=""/124, 0x7c}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000000100)=""/204, 0xcc}, {&(0x7f0000001240)=""/244, 0xf4}, {&(0x7f0000001340)=""/90, 0x5a}], 0x7, &(0x7f0000001440)=""/89, 0x59}, 0x10001}, {{&(0x7f00000014c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000001800)=[{&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000001540)=""/193, 0xc1}, {&(0x7f0000001640)=""/185, 0xb9}, {&(0x7f0000001700)=""/223, 0xdf}, {&(0x7f0000003040)=""/4096, 0x1000}], 0x5, &(0x7f0000001880)=""/105, 0x69}, 0x1}, {{&(0x7f0000001900)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001c40)=[{&(0x7f0000001980)=""/230, 0xe6}, {&(0x7f0000001a80)=""/195, 0xc3}, {&(0x7f0000001b80)=""/38, 0x26}, {&(0x7f0000001bc0)=""/112, 0x70}], 0x4, &(0x7f0000001c80)=""/253, 0xfd}, 0x2000000000000000}, {{&(0x7f0000001d80)=@x25={0x9, @remote}, 0x80, &(0x7f0000001f00)=[{&(0x7f0000001e00)=""/106, 0x6a}, {&(0x7f0000001e80)=""/114, 0x72}], 0x2, &(0x7f0000004040)=""/4096, 0x1000}, 0xffffffffffffcc8f}, {{0x0, 0x0, &(0x7f0000005340)=[{&(0x7f0000001f40)=""/66, 0x42}, {&(0x7f0000005040)=""/187, 0xbb}, {&(0x7f0000005100)=""/152, 0x98}, {&(0x7f00000051c0)=""/232, 0xe8}, {&(0x7f00000052c0)=""/70, 0x46}], 0x5, &(0x7f00000053c0)=""/4096, 0x1000}, 0x3}, {{0x0, 0x0, &(0x7f0000008680)=[{&(0x7f00000063c0)=""/4096, 0x1000}, {&(0x7f00000073c0)=""/214, 0xd6}, {&(0x7f00000074c0)=""/145, 0x91}, {&(0x7f0000007580)=""/249, 0xf9}, {&(0x7f0000007680)=""/4096, 0x1000}], 0x5, &(0x7f0000008700)=""/4096, 0x1000}, 0x1000}, {{&(0x7f0000009700)=@ipx, 0x80, &(0x7f000000ae40)=[{&(0x7f0000009780)=""/239, 0xef}, {&(0x7f0000009880)=""/240, 0xf0}, {&(0x7f0000009980)=""/156, 0x9c}, {&(0x7f0000009a40)=""/168, 0xa8}, {&(0x7f0000009b00)=""/199, 0xc7}, {&(0x7f0000009c00)=""/4096, 0x1000}, {&(0x7f000000ac00)=""/137, 0x89}, {&(0x7f000000acc0)=""/71, 0x47}, {&(0x7f0000001fc0)=""/32, 0x20}, {&(0x7f000000ad40)=""/252, 0xfc}], 0xa, &(0x7f000000af00)=""/4096, 0x1000}, 0x8}, {{&(0x7f000000bf00)=@can, 0x80, &(0x7f000000bfc0)=[{&(0x7f000000bf80)=""/22, 0x16}], 0x1, &(0x7f000000c000)=""/23, 0x17}, 0x1}], 0x8, 0x40, &(0x7f000000c240)={0x0, 0x1c9c380}) [ 480.971573] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 480.978054] b_state=0x00000029, b_size=512 [ 480.982309] device loop0 blocksize: 4096 21:13:02 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="0749323abe4387662d10b7cd76fa130304000000000000c3c7ca160a7b5d2d82068cfdbb81a6fbf8c375677ecbc21685bc57675b607ac350289ac120719ff229bf6da4e191bcee0837dfcaac0518917528ba1d590f46b5240322c1f97f5c4d8903d2dc0096c5bef6b74708000000cee3d90f6aeb04fa55ff1c31d57645f77192b91cdc62428ab2742c28c1f44b81c71e1041fe412e2568ec39b7bf23bc2bc6568121b0bccf91b3c021816f242e3363a32511b78693f810a75ff82452b3f05889945d412d6ab8d78342575ee059a44b0df78589a0d3d84206481b05d31a0b973f091b08aa4adb561b5c54dcd8cf27e71d58a007a3b2124db2fbf1fcfc1ad861d18691d5a45b2538e8bb8c222996a29fd8f0736e446608ad03d2ba05579c93370b5ccff3d63b3cf3f2cfdb4472be1e7d4a6438746f9862e0e31656f65f9c3f378d4223029e18b18ba886f171cba9bd226ecd8effd793cca2458600f093fa20eeed1a05f54006656856445ae6800c9b9b"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="2cfef251f3a7720be4ceb8b35854ca7a150baf81613265a7ebd2881c22046b9e582f7933575510234b04090bb7e338f5bd0498de4b3ae9bf673f749d52ee4aee9156b84e6e699c752dda53812d0268a54ed4be69ef8b8c7e31aba751f3e34537a32486da8907fbdc3fbeae0f890000000000000000005a926124b2fff5b9fdee0eeef022345ea8f6db04a4076c1d89e6f72c05758deba7df675db8c38a4f8bc5ae0cb99f34d88606aae2e5f45f596cfeda781357c017cd683b9d059d56581fc99fe25b6531a54fb90fe070aa0165cd22061184336b580e4d2b46d7f5b52af278d29f27dc90f14a7f4556742ed5dd569626c1290a42b58c3b7e641cf8898da1de364ffd827b2b590c9e1b18969c9ac24cf71af43563d44470e5fbcecb24855fe2fae20dde43e308b83ed0985020a68d3ca25341c6191b6613f8887a7bf8d93ace30ae9a9ecab4", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 481.048284] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 481.054567] b_state=0x00000029, b_size=512 [ 481.058904] device loop0 blocksize: 4096 [ 481.103056] input: syz1 as /devices/virtual/input/input19 [ 481.110348] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 481.116741] b_state=0x00000029, b_size=512 [ 481.120991] device loop0 blocksize: 4096 [ 481.139365] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 481.145839] b_state=0x00000029, b_size=512 [ 481.150079] device loop0 blocksize: 4096 [ 481.186017] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 481.192299] b_state=0x00000029, b_size=512 [ 481.196640] device loop0 blocksize: 4096 [ 481.228587] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 481.234782] b_state=0x00000029, b_size=512 [ 481.239140] device loop0 blocksize: 4096 [ 481.243384] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 481.249583] b_state=0x00000029, b_size=512 [ 481.253816] device loop0 blocksize: 4096 [ 481.259546] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 481.265763] b_state=0x00000029, b_size=512 [ 481.270143] device loop0 blocksize: 4096 [ 481.274414] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 481.280859] b_state=0x00000029, b_size=512 [ 481.285108] device loop0 blocksize: 4096 [ 481.303585] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 481.309921] b_state=0x00000029, b_size=512 [ 481.314161] device loop0 blocksize: 4096 [ 481.319039] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 481.325415] b_state=0x00000029, b_size=512 [ 481.329739] device loop0 blocksize: 4096 [ 481.334378] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 481.340676] b_state=0x00000029, b_size=512 [ 481.344917] device loop0 blocksize: 4096 [ 481.350048] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 481.356413] b_state=0x00000029, b_size=512 [ 481.360894] device loop0 blocksize: 4096 [ 481.365761] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 481.372457] b_state=0x00000029, b_size=512 [ 481.376704] device loop0 blocksize: 4096 21:13:02 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000080)) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) write$FUSE_INTERRUPT(r2, &(0x7f0000000000)={0x10, 0x0, 0x2}, 0x10) ftruncate(r2, 0x2008000) sendfile(r0, r2, 0x0, 0x800000000031) [ 481.407988] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 481.414203] b_state=0x00000029, b_size=512 [ 481.418745] device loop0 blocksize: 4096 [ 481.432266] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 481.438765] b_state=0x00000029, b_size=512 [ 481.443020] device loop0 blocksize: 4096 [ 481.448169] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 481.454584] b_state=0x00000029, b_size=512 [ 481.458925] device loop0 blocksize: 4096 [ 481.463505] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 481.469903] b_state=0x00000029, b_size=512 [ 481.474152] device loop0 blocksize: 4096 [ 481.488734] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 481.494922] b_state=0x00000029, b_size=512 [ 481.499480] device loop0 blocksize: 4096 [ 481.555748] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 481.562196] b_state=0x00000029, b_size=512 [ 481.566432] device loop0 blocksize: 4096 21:13:02 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 481.612512] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 481.618748] b_state=0x00000029, b_size=512 [ 481.623184] device loop0 blocksize: 4096 [ 481.629471] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 481.636029] b_state=0x00000029, b_size=512 [ 481.640321] device loop0 blocksize: 4096 [ 481.655266] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 481.661657] b_state=0x00000029, b_size=512 [ 481.665897] device loop0 blocksize: 4096 [ 481.671342] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 481.677568] b_state=0x00000029, b_size=512 [ 481.681882] device loop0 blocksize: 4096 [ 481.686127] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 481.692401] b_state=0x00000029, b_size=512 [ 481.696643] device loop0 blocksize: 4096 [ 481.700910] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 481.707140] b_state=0x00000029, b_size=512 [ 481.711623] device loop0 blocksize: 4096 [ 481.721545] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 481.727740] b_state=0x00000029, b_size=512 [ 481.732036] device loop0 blocksize: 4096 [ 481.736125] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 481.742365] b_state=0x00000029, b_size=512 [ 481.746603] device loop0 blocksize: 4096 [ 481.750721] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 481.756880] b_state=0x00000029, b_size=512 [ 481.761185] device loop0 blocksize: 4096 [ 481.765268] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 481.771645] b_state=0x00000029, b_size=512 [ 481.775886] device loop0 blocksize: 4096 [ 481.797876] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 481.804226] b_state=0x00000029, b_size=512 [ 481.808466] device loop0 blocksize: 4096 [ 481.877194] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 481.883519] b_state=0x00000029, b_size=512 [ 481.887757] device loop0 blocksize: 4096 [ 481.893821] input: syz1 as /devices/virtual/input/input20 21:13:03 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, 0x0, 0x0) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="2cfef251f3a7720be4ceb8b35854ca7a150baf81613265a7ebd2881c22046b9e582f7933575510234b04090bb7e338f5bd0498de4b3ae9bf673f749d52ee4aee9156b84e6e699c752dda53812d0268a54ed4be69ef8b8c7e31aba751f3e34537a32486da8907fbdc3fbeae0f890000000000000000005a926124b2fff5b9fdee0eeef022345ea8f6db04a4076c1d89e6f72c05758deba7df675db8c38a4f8bc5ae0cb99f34d88606aae2e5f45f596cfeda781357c017cd683b9d059d56581fc99fe25b6531a54fb90fe070aa0165cd22061184336b580e4d2b46d7f5b52af278d29f27dc90f14a7f4556742ed5dd569626c1290a42b58c3b7e641cf8898da1de364ffd827b2b590c9e1b18969c9ac24cf71af43563d44470e5fbcecb24855fe2fae20dde43e308b83ed0985020a68d3ca25341c6191b6613f8887a7bf8d93ace30ae9a9ecab4", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 481.986408] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 481.992870] b_state=0x00000029, b_size=512 [ 481.997127] device loop0 blocksize: 4096 21:13:03 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x1) sendfile(r0, r2, 0x0, 0x800000000031) [ 482.029405] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.035770] b_state=0x00000029, b_size=512 [ 482.040012] device loop0 blocksize: 4096 [ 482.136270] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.142676] b_state=0x00000029, b_size=512 [ 482.147190] device loop0 blocksize: 4096 [ 482.189961] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.196455] b_state=0x00000029, b_size=512 [ 482.200701] device loop0 blocksize: 4096 [ 482.215742] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.221945] b_state=0x00000029, b_size=512 [ 482.226300] device loop0 blocksize: 4096 [ 482.232946] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.239260] b_state=0x00000029, b_size=512 [ 482.243499] device loop0 blocksize: 4096 [ 482.250143] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.256680] b_state=0x00000029, b_size=512 [ 482.260924] device loop0 blocksize: 4096 [ 482.344489] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.350828] b_state=0x00000029, b_size=512 [ 482.355072] device loop0 blocksize: 4096 [ 482.369372] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.375607] b_state=0x00000029, b_size=512 [ 482.379938] device loop0 blocksize: 4096 [ 482.384687] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.390920] b_state=0x00000029, b_size=512 [ 482.395159] device loop0 blocksize: 4096 [ 482.404276] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.410729] b_state=0x00000029, b_size=512 [ 482.414970] device loop0 blocksize: 4096 [ 482.420305] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.426551] b_state=0x00000029, b_size=512 [ 482.430791] device loop0 blocksize: 4096 [ 482.436026] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.442278] b_state=0x00000029, b_size=512 [ 482.446624] device loop0 blocksize: 4096 [ 482.451781] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.458122] b_state=0x00000029, b_size=512 [ 482.462367] device loop0 blocksize: 4096 [ 482.471811] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.478250] b_state=0x00000029, b_size=512 [ 482.482490] device loop0 blocksize: 4096 [ 482.488085] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.494284] b_state=0x00000029, b_size=512 [ 482.498613] device loop0 blocksize: 4096 [ 482.503315] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.509552] b_state=0x00000029, b_size=512 [ 482.513788] device loop0 blocksize: 4096 [ 482.519033] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.525195] b_state=0x00000029, b_size=512 [ 482.529506] device loop0 blocksize: 4096 [ 482.586073] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.592551] b_state=0x00000029, b_size=512 [ 482.596792] device loop0 blocksize: 4096 [ 482.657995] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.664438] b_state=0x00000029, b_size=512 [ 482.668786] device loop0 blocksize: 4096 [ 482.679277] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.685469] b_state=0x00000029, b_size=512 [ 482.689907] device loop0 blocksize: 4096 [ 482.702803] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.709083] b_state=0x00000029, b_size=512 [ 482.713334] device loop0 blocksize: 4096 [ 482.732527] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.738909] b_state=0x00000029, b_size=512 [ 482.743160] device loop0 blocksize: 4096 [ 482.747557] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.753804] b_state=0x00000029, b_size=512 [ 482.753813] device loop0 blocksize: 4096 [ 482.754003] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.768467] b_state=0x00000029, b_size=512 [ 482.772794] device loop0 blocksize: 4096 [ 482.777465] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.783722] b_state=0x00000029, b_size=512 [ 482.787962] device loop0 blocksize: 4096 [ 482.795476] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.801730] b_state=0x00000029, b_size=512 [ 482.805976] device loop0 blocksize: 4096 [ 482.810610] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.816785] b_state=0x00000029, b_size=512 [ 482.821188] device loop0 blocksize: 4096 [ 482.825535] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.831751] b_state=0x00000029, b_size=512 [ 482.835996] device loop0 blocksize: 4096 [ 482.840227] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.846381] b_state=0x00000029, b_size=512 [ 482.850785] device loop0 blocksize: 4096 [ 482.854892] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 482.861872] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.868027] b_state=0x00000029, b_size=512 [ 482.872314] device loop0 blocksize: 4096 [ 482.876393] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.882598] b_state=0x00000029, b_size=512 [ 482.886836] device loop0 blocksize: 4096 [ 482.890967] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.897119] b_state=0x00000029, b_size=512 [ 482.901418] device loop0 blocksize: 4096 [ 482.905506] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.911710] b_state=0x00000029, b_size=512 [ 482.915946] device loop0 blocksize: 4096 [ 482.920022] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.926243] b_state=0x00000029, b_size=512 [ 482.930531] device loop0 blocksize: 4096 [ 482.934601] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.940808] b_state=0x00000029, b_size=512 [ 482.945042] device loop0 blocksize: 4096 [ 482.949107] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.955301] b_state=0x00000029, b_size=512 [ 482.959535] device loop0 blocksize: 4096 [ 482.963664] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.969809] b_state=0x00000029, b_size=512 [ 482.974079] device loop0 blocksize: 4096 [ 482.978177] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.984383] b_state=0x00000029, b_size=512 [ 482.988622] device loop0 blocksize: 4096 [ 482.992761] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 482.998905] b_state=0x00000029, b_size=512 [ 483.003209] device loop0 blocksize: 4096 [ 483.007303] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.013632] b_state=0x00000029, b_size=512 [ 483.017872] device loop0 blocksize: 4096 [ 483.022087] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.028253] b_state=0x00000029, b_size=512 [ 483.032549] device loop0 blocksize: 4096 [ 483.036626] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.042838] b_state=0x00000029, b_size=512 [ 483.047080] device loop0 blocksize: 4096 [ 483.051149] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.057367] b_state=0x00000029, b_size=512 [ 483.061675] device loop0 blocksize: 4096 [ 483.065748] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.071939] b_state=0x00000029, b_size=512 [ 483.076177] device loop0 blocksize: 4096 [ 483.080246] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.086470] b_state=0x00000029, b_size=512 [ 483.090717] device loop0 blocksize: 4096 [ 483.094878] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.101032] b_state=0x00000029, b_size=512 [ 483.105350] device loop0 blocksize: 4096 [ 483.109421] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.115616] b_state=0x00000029, b_size=512 [ 483.119854] device loop0 blocksize: 4096 [ 483.123999] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.130147] b_state=0x00000029, b_size=512 [ 483.134426] device loop0 blocksize: 4096 [ 483.138510] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.144742] b_state=0x00000029, b_size=512 [ 483.148988] device loop0 blocksize: 4096 [ 483.153177] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.159323] b_state=0x00000029, b_size=512 [ 483.163621] device loop0 blocksize: 4096 [ 483.167688] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.173888] b_state=0x00000029, b_size=512 [ 483.178143] device loop0 blocksize: 4096 [ 483.182217] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.188462] b_state=0x00000029, b_size=512 [ 483.192747] device loop0 blocksize: 4096 [ 483.196818] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.203028] b_state=0x00000029, b_size=512 [ 483.207272] device loop0 blocksize: 4096 [ 483.211347] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.217553] b_state=0x00000029, b_size=512 [ 483.221808] device loop0 blocksize: 4096 [ 483.225969] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.232137] b_state=0x00000029, b_size=512 [ 483.236418] device loop0 blocksize: 4096 [ 483.240499] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.246734] b_state=0x00000029, b_size=512 [ 483.250976] device loop0 blocksize: 4096 [ 483.255118] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.261275] b_state=0x00000029, b_size=512 [ 483.265574] device loop0 blocksize: 4096 [ 483.269649] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.275850] b_state=0x00000029, b_size=512 [ 483.280084] device loop0 blocksize: 4096 [ 483.284261] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.290409] b_state=0x00000029, b_size=512 [ 483.294692] device loop0 blocksize: 4096 [ 483.298764] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.304973] b_state=0x00000029, b_size=512 [ 483.309216] device loop0 blocksize: 4096 [ 483.313285] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.319500] b_state=0x00000029, b_size=512 [ 483.323806] device loop0 blocksize: 4096 [ 483.327878] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.334068] b_state=0x00000029, b_size=512 [ 483.338312] device loop0 blocksize: 4096 [ 483.342387] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.348624] b_state=0x00000029, b_size=512 [ 483.352860] device loop0 blocksize: 4096 [ 483.356978] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.363135] b_state=0x00000029, b_size=512 [ 483.367439] device loop0 blocksize: 4096 [ 483.371527] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.377736] b_state=0x00000029, b_size=512 [ 483.382156] device loop0 blocksize: 4096 [ 483.386317] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.392464] b_state=0x00000029, b_size=512 [ 483.396742] device loop0 blocksize: 4096 [ 483.400816] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.407044] b_state=0x00000029, b_size=512 [ 483.411289] device loop0 blocksize: 4096 [ 483.415433] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.421580] b_state=0x00000029, b_size=512 [ 483.425872] device loop0 blocksize: 4096 [ 483.429966] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.436188] b_state=0x00000029, b_size=512 [ 483.440443] device loop0 blocksize: 4096 [ 483.444517] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.450742] b_state=0x00000029, b_size=512 [ 483.455038] device loop0 blocksize: 4096 21:13:04 executing program 4: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000000c0)={0x0, 0x8, 0x2000000000000002, {0x0, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x15182c}}}) ioctl$VIDIOC_STREAMON(0xffffffffffffffff, 0x40045612, &(0x7f0000000040)=0x1) r0 = memfd_create(&(0x7f0000000280)='^$posix_acl_access,\x00', 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000240)={0x0, 0x0, 0x1}) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x3, &(0x7f0000000000), 0xfffffffffffffe0c) r1 = semget$private(0x0, 0x0, 0x100) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000440)=""/252) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x100000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x3f00}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) semctl$SEM_INFO(r1, 0x0, 0x13, &(0x7f0000000380)=""/121) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r4, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1000000000000275, 0x0) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000080)={0x0, @dev, 0x0, 0x0, '\xecbhc|\xd9\aN\"B\xeb~L\xff\"\x01'}, 0x2c) io_setup(0x9, &(0x7f0000000400)) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000300)={0x0, @time={0x0, 0x989680}, 0x6, {0x1}, 0x6, 0x0, 0x3}) 21:13:04 executing program 1: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, 0x0, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="0749323abe4387662d10b7cd76fa130304000000000000c3c7ca160a7b5d2d82068cfdbb81a6fbf8c375677ecbc21685bc57675b607ac350289ac120719ff229bf6da4e191bcee0837dfcaac0518917528ba1d590f46b5240322c1f97f5c4d8903d2dc0096c5bef6b74708000000cee3d90f6aeb04fa55ff1c31d57645f77192b91cdc62428ab2742c28c1f44b81c71e1041fe412e2568ec39b7bf23bc2bc6568121b0bccf91b3c021816f242e3363a32511b78693f810a75ff82452b3f05889945d412d6ab8d78342575ee059a44b0df78589a0d3d84206481b05d31a0b973f091b08aa4adb561b5c54dcd8cf27e71d58a007a3b2124db2fbf1fcfc1ad861d18691d5a45b2538e8bb8c222996a29fd8f0736e446608ad03d2ba05579c93370b5ccff3d63b3cf3f2cfdb4472be1e7d4a6438746f9862e0e31656f65f9c3f378d4223029e18b18ba886f171cba9bd226ecd8effd793cca2458600f093fa20eeed1a05f54006656856445ae6800c9b9b"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:04 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r3 = dup3(r1, r2, 0x0) write$binfmt_misc(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x9e) r4 = gettid() setpriority(0xffffffffffffffff, r4, 0xff) ftruncate(r2, 0x2008000) getsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000180), &(0x7f00000001c0)=0x4) getsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendfile(r0, r2, 0x0, 0x800000000031) 21:13:04 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:04 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(0x0, 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="0749323abe4387662d10b7cd76fa130304000000000000c3c7ca160a7b5d2d82068cfdbb81a6fbf8c375677ecbc21685bc57675b607ac350289ac120719ff229bf6da4e191bcee0837dfcaac0518917528ba1d590f46b5240322c1f97f5c4d8903d2dc0096c5bef6b74708000000cee3d90f6aeb04fa55ff1c31d57645f77192b91cdc62428ab2742c28c1f44b81c71e1041fe412e2568ec39b7bf23bc2bc6568121b0bccf91b3c021816f242e3363a32511b78693f810a75ff82452b3f05889945d412d6ab8d78342575ee059a44b0df78589a0d3d84206481b05d31a0b973f091b08aa4adb561b5c54dcd8cf27e71d58a007a3b2124db2fbf1fcfc1ad861d18691d5a45b2538e8bb8c222996a29fd8f0736e446608ad03d2ba05579c93370b5ccff3d63b3cf3f2cfdb4472be1e7d4a6438746f9862e0e31656f65f9c3f378d4223029e18b18ba886f171cba9bd226ecd8effd793cca2458600f093fa20eeed1a05f54006656856445ae6800c9b9b"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="2cfef251f3a7720be4ceb8b35854ca7a150baf81613265a7ebd2881c22046b9e582f7933575510234b04090bb7e338f5bd0498de4b3ae9bf673f749d52ee4aee9156b84e6e699c752dda53812d0268a54ed4be69ef8b8c7e31aba751f3e34537a32486da8907fbdc3fbeae0f890000000000000000005a926124b2fff5b9fdee0eeef022345ea8f6db04a4076c1d89e6f72c05758deba7df675db8c38a4f8bc5ae0cb99f34d88606aae2e5f45f596cfeda781357c017cd683b9d059d56581fc99fe25b6531a54fb90fe070aa0165cd22061184336b580e4d2b46d7f5b52af278d29f27dc90f14a7f4556742ed5dd569626c1290a42b58c3b7e641cf8898da1de364ffd827b2b590c9e1b18969c9ac24cf71af43563d44470e5fbcecb24855fe2fae20dde43e308b83ed0985020a68d3ca25341c6191b6613f8887a7bf8d93ace30ae9a9ecab4", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:04 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2008000) open(&(0x7f0000000000)='./bus\x00', 0x80000, 0x86) sendfile(r0, r1, 0x0, 0x800000000031) [ 483.459128] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.465364] b_state=0x00000029, b_size=512 [ 483.469610] device loop0 blocksize: 4096 [ 483.473687] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.479917] b_state=0x00000029, b_size=512 [ 483.484163] device loop0 blocksize: 4096 [ 483.488328] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.494482] b_state=0x00000029, b_size=512 [ 483.498879] device loop0 blocksize: 4096 [ 483.532250] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.538602] b_state=0x00000029, b_size=512 [ 483.542847] device loop0 blocksize: 4096 [ 483.596671] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.602920] b_state=0x00000029, b_size=512 [ 483.607061] audit: type=1804 audit(5840716384.715:118): pid=19022 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir440165481/syzkaller.DyWurO/332/bus" dev="sda1" ino=17433 res=1 [ 483.607268] device loop0 blocksize: 4096 [ 483.724121] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.730664] b_state=0x00000029, b_size=512 [ 483.734922] device loop0 blocksize: 4096 [ 483.743419] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.749793] b_state=0x00000029, b_size=512 [ 483.754030] device loop0 blocksize: 4096 [ 483.809167] IPVS: sync thread started: state = BACKUP, mcast_ifn = ip6tnl0, syncid = 2, id = 0 [ 483.844165] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.850510] b_state=0x00000029, b_size=512 [ 483.854750] device loop0 blocksize: 4096 [ 483.859531] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.865738] b_state=0x00000029, b_size=512 [ 483.870200] device loop0 blocksize: 4096 [ 483.912574] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.918884] b_state=0x00000029, b_size=512 [ 483.923128] device loop0 blocksize: 4096 [ 483.927676] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.934151] b_state=0x00000029, b_size=512 [ 483.938411] device loop0 blocksize: 4096 [ 483.942792] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.949300] b_state=0x00000029, b_size=512 [ 483.953548] device loop0 blocksize: 4096 [ 483.985376] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 483.991905] b_state=0x00000029, b_size=512 [ 483.996161] device loop0 blocksize: 4096 21:13:05 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x2) close(r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x81, 0x2, 0xff, 0x2, 0x0, 0x6}, 0x20) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2008000) sendfile(r0, r1, 0x0, 0x800000000031) 21:13:05 executing program 1: r0 = socket(0xa, 0x1000000001, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nr0=\xb4\x86,g\xc3\xda\x87\x00\x19\x00', 0x1}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000300)="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") ioctl(r0, 0x8936, &(0x7f0000000000)) [ 484.120157] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 484.126478] b_state=0x00000029, b_size=512 [ 484.131111] device loop0 blocksize: 4096 [ 484.172326] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 484.178698] b_state=0x00000029, b_size=512 [ 484.183147] device loop0 blocksize: 4096 21:13:05 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="0749323abe4387662d10b7cd76fa130304000000000000c3c7ca160a7b5d2d82068cfdbb81a6fbf8c375677ecbc21685bc57675b607ac350289ac120719ff229bf6da4e191bcee0837dfcaac0518917528ba1d590f46b5240322c1f97f5c4d8903d2dc0096c5bef6b74708000000cee3d90f6aeb04fa55ff1c31d57645f77192b91cdc62428ab2742c28c1f44b81c71e1041fe412e2568ec39b7bf23bc2bc6568121b0bccf91b3c021816f242e3363a32511b78693f810a75ff82452b3f05889945d412d6ab8d78342575ee059a44b0df78589a0d3d84206481b05d31a0b973f091b08aa4adb561b5c54dcd8cf27e71d58a007a3b2124db2fbf1fcfc1ad861d18691d5a45b2538e8bb8c222996a29fd8f0736e446608ad03d2ba05579c93370b5ccff3d63b3cf3f2cfdb4472be1e7d4a6438746f9862e0e31656f65f9c3f378d4223029e18b18ba886f171cba9bd226ecd8effd793cca2458600f093fa20eeed1a05f54006656856445ae6800c9b9b"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 484.222283] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 484.228517] b_state=0x00000029, b_size=512 [ 484.232873] device loop0 blocksize: 4096 [ 484.237157] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 484.243614] b_state=0x00000029, b_size=512 [ 484.247850] device loop0 blocksize: 4096 [ 484.255910] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 484.262364] b_state=0x00000029, b_size=512 [ 484.266637] device loop0 blocksize: 4096 21:13:05 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="2cfef251f3a7720be4ceb8b35854ca7a150baf81613265a7ebd2881c22046b9e582f7933575510234b04090bb7e338f5bd0498de4b3ae9bf673f749d52ee4aee9156b84e6e699c752dda53812d0268a54ed4be69ef8b8c7e31aba751f3e34537a32486da8907fbdc3fbeae0f890000000000000000005a926124b2fff5b9fdee0eeef022345ea8f6db04a4076c1d89e6f72c05758deba7df675db8c38a4f8bc5ae0cb99f34d88606aae2e5f45f596cfeda781357c017cd683b9d059d56581fc99fe25b6531a54fb90fe070aa0165cd22061184336b580e4d2b46d7f5b52af278d29f27dc90f14a7f4556742ed5dd569626c1290a42b58c3b7e641cf8898da1de364ffd827b2b590c9e1b18969c9ac24cf71af43563d44470e5fbcecb24855fe2fae20dde43e308b83ed0985020a68d3ca25341c6191b6613f8887a7bf8d93ace30ae9a9ecab4", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 484.296975] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 484.303238] b_state=0x00000029, b_size=512 [ 484.307471] device loop0 blocksize: 4096 [ 484.324761] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 484.331008] b_state=0x00000029, b_size=512 [ 484.335361] device loop0 blocksize: 4096 [ 484.339573] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 484.346018] b_state=0x00000029, b_size=512 [ 484.350259] device loop0 blocksize: 4096 [ 484.413036] audit: type=1804 audit(5840716385.518:119): pid=19045 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir440165481/syzkaller.DyWurO/332/bus" dev="sda1" ino=17433 res=1 [ 484.417358] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 484.442535] b_state=0x00000029, b_size=512 [ 484.446851] device loop0 blocksize: 4096 [ 484.451018] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 484.457515] b_state=0x00000029, b_size=512 [ 484.461757] device loop0 blocksize: 4096 [ 484.473967] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 484.480151] b_state=0x00000029, b_size=512 [ 484.480162] device loop0 blocksize: 4096 [ 484.480190] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 484.480197] b_state=0x00000029, b_size=512 [ 484.480204] device loop0 blocksize: 4096 [ 484.480220] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 484.480227] b_state=0x00000029, b_size=512 [ 484.480232] device loop0 blocksize: 4096 [ 484.480246] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 484.480253] b_state=0x00000029, b_size=512 [ 484.480259] device loop0 blocksize: 4096 [ 484.480273] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 484.504560] b_state=0x00000029, b_size=512 [ 484.504571] device loop0 blocksize: 4096 21:13:05 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2008000) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x8, 0xa80) sendfile(r0, r1, 0x0, 0x800000000031) [ 484.531296] audit: type=1804 audit(5840716385.548:120): pid=19045 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir440165481/syzkaller.DyWurO/332/bus" dev="sda1" ino=17433 res=1 [ 484.563340] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 484.578463] b_state=0x00000029, b_size=512 [ 484.582703] device loop0 blocksize: 4096 21:13:05 executing program 1: socket$inet6(0xa, 0x80003, 0x800000000000006) r0 = socket$netlink(0x10, 0x3, 0x4) r1 = socket(0x10, 0x2, 0x0) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x2000, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000140)={0x8, 0x3}) write$FUSE_GETXATTR(r2, &(0x7f00000000c0)={0x18, 0xffffffffffffffda, 0x2, {0x3}}, 0x18) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x17c) ioctl$TIOCLINUX7(r2, 0x541c, &(0x7f0000000100)={0x7, 0x56}) setresuid(0x0, r3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000)={0x10, 0xf}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)={0x48, 0x15, 0x7, 0x0, 0x0, {0xa, 0xf0ffff, 0x600}, [@generic="667e279639a91d7b7f0000017daf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f423682a9447015739d53d5"]}, 0x48}}, 0x0) 21:13:05 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x200, 0xfe61) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffff7f00000000f207000000000000010000000006000001000000000000000083fa0000000000030000000000000070050000000000000000000000000000000000000000000004000000000000000000000000000000"]) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x100000000, 0x2200) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x6000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x11c, r2, 0x108, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x200}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK={0x74, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf36a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff0}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000001}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x11c}, 0x1, 0x0, 0x0, 0x24000000}, 0x4000000) recvmmsg(r0, &(0x7f000000e180)=[{{0x0, 0x0, &(0x7f0000006f80)=[{&(0x7f0000006f00)=""/124, 0x7c}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 484.701516] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 484.707821] b_state=0x00000029, b_size=512 [ 484.712061] device loop0 blocksize: 4096 [ 484.730221] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 484.736682] b_state=0x00000029, b_size=512 [ 484.740955] device loop0 blocksize: 4096 [ 484.777258] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 484.783512] b_state=0x00000029, b_size=512 [ 484.787860] device loop0 blocksize: 4096 [ 484.803843] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 484.810168] b_state=0x00000029, b_size=512 [ 484.814410] device loop0 blocksize: 4096 21:13:05 executing program 0: llistxattr(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)=""/209, 0xd1) r0 = socket$inet6(0xa, 0x400000040001, 0x24a) ioctl(r0, 0x8, &(0x7f00000001c0)) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x80, 0x1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) ioctl$VIDIOC_S_AUDOUT(r1, 0x40345632, &(0x7f00000001c0)={0x401, "d991177fca61d148d38cef50e5e9e1154ec68166388ca3d7d319b93e35d4fa3b", 0x3, 0x1}) open(&(0x7f0000000200)='./bus\x00', 0x44000, 0x80) sendfile(r0, r1, 0x0, 0x1d) 21:13:05 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x20000, 0x0) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000140)) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x315) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000500)=ANY=[@ANYRESDEC=0x0, @ANYRESOCT, @ANYRESHEX=r1, @ANYRESDEC=r0, @ANYRESDEC=r0, @ANYPTR64, @ANYRES16=r0, @ANYRES16], &(0x7f00000002c0)=0x8) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000800)='dctcp\x00', 0x7bddb19f035b91ae) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) [ 484.834483] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 484.840805] b_state=0x00000029, b_size=512 [ 484.845043] device loop0 blocksize: 4096 [ 484.858283] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 484.864600] b_state=0x00000029, b_size=512 [ 484.869153] device loop0 blocksize: 4096 [ 484.876872] __find_get_block_slow() failed. block=1, b_blocknr=8 21:13:06 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="0749323abe4387662d10b7cd76fa130304000000000000c3c7ca160a7b5d2d82068cfdbb81a6fbf8c375677ecbc21685bc57675b607ac350289ac120719ff229bf6da4e191bcee0837dfcaac0518917528ba1d590f46b5240322c1f97f5c4d8903d2dc0096c5bef6b74708000000cee3d90f6aeb04fa55ff1c31d57645f77192b91cdc62428ab2742c28c1f44b81c71e1041fe412e2568ec39b7bf23bc2bc6568121b0bccf91b3c021816f242e3363a32511b78693f810a75ff82452b3f05889945d412d6ab8d78342575ee059a44b0df78589a0d3d84206481b05d31a0b973f091b08aa4adb561b5c54dcd8cf27e71d58a007a3b2124db2fbf1fcfc1ad861d18691d5a45b2538e8bb8c222996a29fd8f0736e446608ad03d2ba05579c93370b5ccff3d63b3cf3f2cfdb4472be1e7d4a6438746f9862e0e31656f65f9c3f378d4223029e18b18ba886f171cba9bd226ecd8effd793cca2458600f093fa20eeed1a05f54006656856445ae6800c9b9b"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:06 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2008000) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x40, 0x400000) sendfile(r0, r1, 0x0, 0x800000000031) [ 484.883361] b_state=0x00000029, b_size=512 [ 484.887734] device loop0 blocksize: 4096 [ 484.899755] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 484.906257] b_state=0x00000029, b_size=512 [ 484.910764] device loop0 blocksize: 4096 [ 484.915287] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 484.921710] b_state=0x00000029, b_size=512 [ 484.925964] device loop0 blocksize: 4096 21:13:06 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 484.947857] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 484.954308] b_state=0x00000029, b_size=512 [ 484.958739] device loop0 blocksize: 4096 [ 484.967834] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 484.974091] b_state=0x00000029, b_size=512 [ 484.978445] device loop0 blocksize: 4096 [ 484.983909] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 484.990461] b_state=0x00000029, b_size=512 [ 484.994705] device loop0 blocksize: 4096 [ 484.997875] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 485.005194] b_state=0x00000029, b_size=512 [ 485.009643] device loop0 blocksize: 4096 [ 485.032460] audit: type=1804 audit(5840716386.143:121): pid=19077 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir048627339/syzkaller.VsHQoN/28/bus" dev="sda1" ino=17421 res=1 [ 485.080308] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 485.086702] b_state=0x00000029, b_size=512 [ 485.091045] device loop0 blocksize: 4096 21:13:06 executing program 0: openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x600840, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x92, 0x2005) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2008000) fstatfs(r2, &(0x7f0000000240)=""/95) syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x301400, 0x0) sendto$rose(r3, &(0x7f0000000080)="f95711aaf94c717b7ffc1d13b7d94dcbef211c6d3d9416b5384ee2522914df6c8328081942fdd4201b3224e8b6b642105e2978d009929b8818d9a3b5b4c1c6a0e91c701ee198e2d862fd16096cd48af85db1408481405b0819411cda8ac170306b15619dfefd734526bfb66d2d3c5a60550fccd9d4f9295245e79d674f942c80ab5c75a5f41cb946ca33", 0x8a, 0x40000, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r1, 0xc040563e, &(0x7f0000000000)={0x0, 0x0, 0x102, 0x7, {0x7, 0x274f, 0x100000000, 0x974}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000140)=0x1e, 0x4) sendfile(r2, r2, 0x0, 0x800000000031) 21:13:06 executing program 1: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 485.113594] audit: type=1804 audit(5840716386.173:122): pid=19077 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir048627339/syzkaller.VsHQoN/28/bus" dev="sda1" ino=17421 res=1 [ 485.128744] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 485.143000] b_state=0x00000029, b_size=512 [ 485.147245] device loop0 blocksize: 4096 [ 485.257787] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 485.264115] b_state=0x00000029, b_size=512 [ 485.268356] device loop0 blocksize: 4096 [ 485.338739] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 485.345000] b_state=0x00000029, b_size=512 [ 485.349235] device loop0 blocksize: 4096 [ 485.353677] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 485.359828] b_state=0x00000029, b_size=512 [ 485.364194] device loop0 blocksize: 4096 [ 485.369296] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 485.375650] b_state=0x00000029, b_size=512 [ 485.379885] device loop0 blocksize: 4096 [ 485.384151] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 485.390306] b_state=0x00000029, b_size=512 [ 485.394654] device loop0 blocksize: 4096 [ 485.398847] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 485.405302] b_state=0x00000029, b_size=512 [ 485.409538] device loop0 blocksize: 4096 [ 485.443367] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 485.449646] b_state=0x00000029, b_size=512 [ 485.453980] device loop0 blocksize: 4096 [ 485.458965] audit: type=1804 audit(5840716386.173:123): pid=19081 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir048627339/syzkaller.VsHQoN/28/bus" dev="sda1" ino=17421 res=1 [ 485.483419] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 485.489661] b_state=0x00000029, b_size=512 [ 485.493973] device loop0 blocksize: 4096 [ 485.498846] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 485.505181] b_state=0x00000029, b_size=512 [ 485.509417] device loop0 blocksize: 4096 [ 485.514167] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 485.520414] b_state=0x00000029, b_size=512 [ 485.524752] device loop0 blocksize: 4096 [ 485.529624] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 485.535927] b_state=0x00000029, b_size=512 [ 485.540167] device loop0 blocksize: 4096 [ 485.544834] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 485.551078] b_state=0x00000029, b_size=512 [ 485.555386] device loop0 blocksize: 4096 [ 485.560222] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 485.566540] b_state=0x00000029, b_size=512 [ 485.570777] device loop0 blocksize: 4096 [ 485.575476] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 485.581742] b_state=0x00000029, b_size=512 [ 485.586065] device loop0 blocksize: 4096 [ 485.591025] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 485.597391] b_state=0x00000029, b_size=512 [ 485.601627] device loop0 blocksize: 4096 [ 485.606414] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 485.612834] b_state=0x00000029, b_size=512 [ 485.617074] device loop0 blocksize: 4096 21:13:06 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(0xffffffffffffffff, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 485.641945] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 485.648434] b_state=0x00000029, b_size=512 [ 485.652677] device loop0 blocksize: 4096 [ 485.669007] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 485.675300] b_state=0x00000029, b_size=512 [ 485.679538] device loop0 blocksize: 4096 [ 485.684382] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 485.690729] b_state=0x00000029, b_size=512 [ 485.695304] device loop0 blocksize: 4096 [ 485.717724] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 485.724020] b_state=0x00000029, b_size=512 [ 485.728261] device loop0 blocksize: 4096 [ 485.736605] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 485.742799] b_state=0x00000029, b_size=512 [ 485.747229] device loop0 blocksize: 4096 [ 485.767271] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 485.773497] b_state=0x00000029, b_size=512 [ 485.777993] device loop0 blocksize: 4096 [ 485.787755] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 485.793993] b_state=0x00000029, b_size=512 [ 485.798318] device loop0 blocksize: 4096 [ 485.802510] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 485.808761] b_state=0x00000029, b_size=512 [ 485.812999] device loop0 blocksize: 4096 21:13:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) getsockopt$inet6_opts(r3, 0x29, 0x0, &(0x7f0000000080)=""/13, &(0x7f00000000c0)=0xd) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text16={0x10, &(0x7f00000003c0)="0f20d86635080000000f22d866b80500000066b9060d20500f01c1ba6100b01aeed9a6390b0f0174170f009a0050670f01caba610066b80010000066ef260f22276766c74424004edeac976766c74424022c0000006766c744240600000000670f011424", 0x64}], 0x1, 0x0, &(0x7f0000000080), 0x0) statx(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x7ff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)={0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000140)) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 485.817258] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 485.823555] b_state=0x00000029, b_size=512 [ 485.827904] device loop0 blocksize: 4096 [ 485.832086] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 485.838538] b_state=0x00000029, b_size=512 [ 485.842775] device loop0 blocksize: 4096 [ 485.848206] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 485.854662] b_state=0x00000029, b_size=512 [ 485.858901] device loop0 blocksize: 4096 [ 485.863249] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 485.869560] b_state=0x00000029, b_size=512 [ 485.873800] device loop0 blocksize: 4096 [ 485.878205] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 485.884424] b_state=0x00000029, b_size=512 [ 485.888789] device loop0 blocksize: 4096 [ 485.906161] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 485.916512] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 485.922866] b_state=0x00000029, b_size=512 [ 485.927323] device loop0 blocksize: 4096 [ 485.942751] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 485.949018] b_state=0x00000029, b_size=512 [ 485.953283] device loop0 blocksize: 4096 [ 486.009612] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 486.016067] b_state=0x00000029, b_size=512 [ 486.020336] device loop0 blocksize: 4096 [ 486.047143] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 486.053331] b_state=0x00000029, b_size=512 [ 486.057642] device loop0 blocksize: 4096 21:13:07 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000000000)='./bus\x00', 0x200000, 0x800) ftruncate(r1, 0x2008000) sendfile(r0, r1, 0x0, 0x800000000031) [ 486.099525] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 486.105938] b_state=0x00000029, b_size=512 [ 486.110379] device loop0 blocksize: 4096 [ 486.125090] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 486.131438] b_state=0x00000029, b_size=512 [ 486.135676] device loop0 blocksize: 4096 21:13:07 executing program 1: unshare(0x400) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000080)={0x2, 0x2058}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = gettid() connect$rose(r2, &(0x7f0000000140)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) setpriority(0x3, r3, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000000000000000000000000000000000000000000000"]) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f0000000180)={'HL\x00'}, &(0x7f00000001c0)=0x1e) vmsplice(r2, &(0x7f0000000780)=[{&(0x7f0000001480)='9', 0x1}], 0x1, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r4, 0x0, 0x7, 0x0) 21:13:07 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="0749323abe4387662d10b7cd76fa130304000000000000c3c7ca160a7b5d2d82068cfdbb81a6fbf8c375677ecbc21685bc57675b607ac350289ac120719ff229bf6da4e191bcee0837dfcaac0518917528ba1d590f46b5240322c1f97f5c4d8903d2dc0096c5bef6b74708000000cee3d90f6aeb04fa55ff1c31d57645f77192b91cdc62428ab2742c28c1f44b81c71e1041fe412e2568ec39b7bf23bc2bc6568121b0bccf91b3c021816f242e3363a32511b78693f810a75ff82452b3f05889945d412d6ab8d78342575ee059a44b0df78589a0d3d84206481b05d31a0b973f091b08aa4adb561b5c54dcd8cf27e71d58a007a3b2124db2fbf1fcfc1ad861d18691d5a45b2538e8bb8c222996a29fd8f0736e446608ad03d2ba05579c93370b5ccff3d63b3cf3f2cfdb4472be1e7d4a6438746f9862e0e31656f65f9c3f378d4223029e18b18ba886f171cba9bd226ecd8effd793cca2458600f093fa20eeed1a05f54006656856445ae6800c9b9b"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 486.167003] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 486.173305] b_state=0x00000029, b_size=512 [ 486.177609] device loop0 blocksize: 4096 21:13:07 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2008000) syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x4, 0x20000) sendfile(r0, r1, 0x0, 0x800000000031) [ 486.227904] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 486.234277] b_state=0x00000029, b_size=512 [ 486.240117] device loop0 blocksize: 4096 21:13:07 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000005cc0)={0x0, 0x0, &(0x7f0000005c80)={&(0x7f00000059c0)=ANY=[@ANYBLOB="34095079f89f25fa4800000000000000e008021aea93000000000000000000000000000000000000fe2215000000000000000000"], 0x34}}, 0x0) 21:13:07 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x0) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 486.296626] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 486.303012] b_state=0x00000029, b_size=512 [ 486.307270] device loop0 blocksize: 4096 [ 486.367792] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 486.374166] b_state=0x00000029, b_size=512 [ 486.378406] device loop0 blocksize: 4096 21:13:07 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2008000) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000000)=""/126, &(0x7f0000000080)=0x7e) sendfile(r0, r1, 0x0, 0x800000000031) [ 486.444284] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 486.450703] b_state=0x00000029, b_size=512 [ 486.454945] device loop0 blocksize: 4096 [ 486.476893] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 486.483205] b_state=0x00000029, b_size=512 [ 486.487446] device loop0 blocksize: 4096 [ 486.554073] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 486.560345] b_state=0x00000029, b_size=512 [ 486.564710] device loop0 blocksize: 4096 [ 486.591064] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 486.597285] b_state=0x00000029, b_size=512 21:13:07 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200), 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0xffffffffffffffff, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) [ 486.601786] device loop0 blocksize: 4096 [ 486.607734] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 486.614015] b_state=0x00000029, b_size=512 [ 486.618276] device loop0 blocksize: 4096 [ 486.634625] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 486.640888] b_state=0x00000029, b_size=512 [ 486.645249] device loop0 blocksize: 4096 [ 486.652784] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 486.659017] b_state=0x00000029, b_size=512 [ 486.663461] device loop0 blocksize: 4096 [ 486.667744] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 486.674578] b_state=0x00000029, b_size=512 [ 486.678839] device loop0 blocksize: 4096 [ 486.774845] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 486.781125] b_state=0x00000029, b_size=512 [ 486.785444] device loop0 blocksize: 4096 21:13:07 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:08 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00\x00\x00\x00\x00\x11\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 486.886219] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 486.892584] b_state=0x00000029, b_size=512 [ 486.896913] device loop0 blocksize: 4096 [ 486.901697] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 486.907946] b_state=0x00000029, b_size=512 [ 486.912184] device loop0 blocksize: 4096 [ 486.917983] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 486.924396] b_state=0x00000029, b_size=512 [ 486.928640] device loop0 blocksize: 4096 [ 486.935040] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 486.941205] b_state=0x00000029, b_size=512 [ 486.945504] device loop0 blocksize: 4096 [ 486.949586] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 486.955915] b_state=0x00000029, b_size=512 [ 486.960158] device loop0 blocksize: 4096 [ 487.091186] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 487.097696] b_state=0x00000029, b_size=512 [ 487.101935] device loop0 blocksize: 4096 [ 487.173633] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 487.180060] b_state=0x00000029, b_size=512 [ 487.184313] device loop0 blocksize: 4096 [ 487.188742] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 487.195015] b_state=0x00000029, b_size=512 [ 487.199340] device loop0 blocksize: 4096 [ 487.204129] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 487.210479] b_state=0x00000029, b_size=512 [ 487.214717] device loop0 blocksize: 4096 [ 487.223452] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 487.229698] b_state=0x00000029, b_size=512 [ 487.233938] device loop0 blocksize: 4096 [ 487.242687] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 487.248962] b_state=0x00000029, b_size=512 [ 487.253210] device loop0 blocksize: 4096 [ 487.306877] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 487.313239] b_state=0x00000029, b_size=512 [ 487.317551] device loop0 blocksize: 4096 [ 487.321957] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 487.328307] b_state=0x00000029, b_size=512 [ 487.332546] device loop0 blocksize: 4096 [ 487.337060] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 487.343262] b_state=0x00000029, b_size=512 [ 487.347701] device loop0 blocksize: 4096 [ 487.352245] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 487.358512] b_state=0x00000029, b_size=512 [ 487.362756] device loop0 blocksize: 4096 [ 487.394604] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 487.401050] b_state=0x00000029, b_size=512 [ 487.405298] device loop0 blocksize: 4096 [ 487.416667] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 487.423006] b_state=0x00000029, b_size=512 [ 487.427270] device loop0 blocksize: 4096 [ 487.477033] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 487.483406] b_state=0x00000029, b_size=512 [ 487.487653] device loop0 blocksize: 4096 [ 487.496994] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 487.503282] b_state=0x00000029, b_size=512 [ 487.507528] device loop0 blocksize: 4096 21:13:08 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2008000) sendfile(r0, r1, 0x0, 0x800000000031) 21:13:08 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000280)='/dev/radio#\x00', 0x0, 0x2) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0)={0x0, 0xa3}, &(0x7f0000000300)=0xc) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000340)={r1, @in={{0x2, 0x4e23, @local}}}, &(0x7f0000000400)=0x84) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x1, 0xc2100) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000480)='/dev/amidi#\x00', 0x8, 0x2de0217b9ba82eb9) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0a5c1f023c126285719070") write$P9_RUNLINKAT(r4, &(0x7f00000004c0)={0x7, 0x4d, 0x1}, 0x7) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000440)=r0) r5 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x202, 0x800000002009) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f0000000500)={0x1, 0x9, 0x3ff, 0x6, 0x7883}) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fstat(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r5, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) setresgid(r6, r7, r8) fsetxattr(r0, &(0x7f0000000540)=@random={'security.', '/dev/radio#\x00'}, &(0x7f0000000580)='/dev/amidi#\x00', 0xc, 0x3) ioctl$FS_IOC_FSGETXATTR(r5, 0xc0185500, &(0x7f0000000000)={0x20123, 0x3}) [ 487.536381] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 487.542786] b_state=0x00000029, b_size=512 [ 487.547023] device loop0 blocksize: 4096 21:13:08 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2008000) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="ff0300000000000009000000000000000300000000000000", @ANYRES32=r0, @ANYBLOB="0000000009000000000000000000009d3aff3aa02d2d67a57ad906ef9872af43401d0a8cb34fee7b891c5cb12b8de8376b8b88ded17e3050bec3837fff83b4a3438ec5d536264559f377684fa16f3edc6c45564ca5e27faccc1f9be901916994abe67d4f92d71f570aed1d2b1539391436bc0b0c71afda392c4b11ad32a246d612cd7813de86a81daf2677e27e1f3a2467fb391733517ea5af492d0d5aec45ef61e51ae55cc436e8e5708e2507066f8831a2d986402ec9ea203e5a9b82daf9e033cbc1257e35cdd6f1f3728ad4ece19d", @ANYRES32=r1, @ANYBLOB="00000000010000000000000000000000000000000000000000000000", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) sendfile(r0, r2, 0x0, 0x800000000031) [ 487.639143] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 487.645546] b_state=0x00000029, b_size=512 [ 487.649863] device loop0 blocksize: 4096 21:13:08 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, 0x0, 0x0) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:08 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00\x00\x00\x00\x11\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 487.746852] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 487.753257] b_state=0x00000029, b_size=512 [ 487.757501] device loop0 blocksize: 4096 [ 487.765329] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub 21:13:08 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) signalfd4(r0, &(0x7f0000000300)={0x40}, 0x8, 0x800) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = accept(r1, &(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local}, &(0x7f0000000200)=0x80) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) pipe2(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000480)={'teql0\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r3, 0x40405515, &(0x7f0000000240)={0x0, 0x7, 0x0, 0x4, '\x00', 0x6e0}) r4 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r4, r0, 0x0, 0x1, &(0x7f0000000040)='\x00'}, 0x30) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x20, 0x0, 0x1}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet6_mreq(r2, 0x29, 0x14, &(0x7f00000004c0)={@mcast1, 0x0}, &(0x7f0000000540)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000580)={'team0\x00', r5}) r6 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f00000002c0)={'team0\x00'}) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x40, 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000340)='9p\x00', 0x40, &(0x7f00000004c0)=ANY=[]) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000100)={'team0\x00\x00\xff\xff\xff\xc0\x00', 0x4bfd}) ioctl$TCSETAW(r3, 0x5407, &(0x7f0000000180)={0x8, 0x6, 0x4, 0x8, 0x8, 0x6, 0x400, 0x1, 0x41, 0xfffffffffffff001}) syz_open_dev$dspn(0x0, 0x0, 0x80080) setsockopt$inet6_IPV6_PKTINFO(r7, 0x29, 0x32, &(0x7f00000007c0)={@local}, 0x14) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) [ 487.921927] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 487.928194] b_state=0x00000029, b_size=512 [ 487.932540] device loop0 blocksize: 4096 [ 487.936887] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 487.943350] b_state=0x00000029, b_size=512 [ 487.947591] device loop0 blocksize: 4096 [ 487.952432] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 487.958629] b_state=0x00000029, b_size=512 [ 487.963130] device loop0 blocksize: 4096 21:13:09 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) ftruncate(r2, 0x2008000) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) sendfile(r0, r2, 0x0, 0x800000000031) setsockopt$inet6_buf(r0, 0x29, 0xff, &(0x7f0000002040)="aa5d175a34a6d57938c51141a2045bee650fb894986f680115926ebf56ad662ae3634571c9f41572d173de3595df8aef7846af65170beb435f5138dd74351a930ff849ddd31040ce0615d1e9d7b3920049dd6f50df0e206e8a946b56fedd0a9a3a12db81c181931b6854f2d99882e0434942698716a417797547e74fd75dc8c56acad21f28c16fa03b103de6b391efe4c3549cc31342d537bd6ccf74914a6e88e0ac36b5491f77666c1b300fff505e5e673b9fa24c938563a7c614b0869e515bd1b44c2762841591bb179294d62cdc508a6e08c86a8442fe806957d740781fe60e0811e00087d64b9b59414475eb1c1eb8c02fdef21c932cf62b8b8bb02a3feae12c12840ef9c8c8c478f725240bddd3d34782c81255c10cf859257d6d81168a98e109618b1b8a4d9bd355adb395f1243a74ef6a166591f1ce91f1ec6e2d56df99631ca3ac21a17bad348b068814871737006320d1e560e93839baa08ef5a25f73553f5a71a9a8876337210bbfa3ab845782fa625a636b7d656bfc456c0dd9a0fb82ed0857001f92b763c1d999cdf831802b6f1d2534b4c6fac6ab13efec4f3ad32076980c6b277ca40937c32576ee343d21dba965d9be309f61c6914b4bbc8c0097c70a32a6c930b5f95eb353fd1cf087f155c9dd5b6bfe7aa42d7be69b8ada4c55bb9940f8924614d4dfeacd035f2e20053976951a60652a8e30d08b2c9acb701f6ad22c4a1c2676443d390faec5d2d30ddd2ddbab58ad2832a1e26c74614693b1ffa73b430a381eb15bf0e1a3488fec9f3632b06ccb955cdf11d1534a5a973cd74f568ef47577d7136b6db417c51e87ca6dd542f7e1e841a829a2ea6ebfe52e923509f54b1d25fb7adbbffb7d5bb21707eeafc273bf3af5238dce72e9860ec9c84bee78cc35df5c9b00dcd05c86204f6099f8f49a5f71ca95d8f6f42dddf17a5dff805df33ac998e39e5ea6f0362da924ff84b97bf6bbe8fb0714cdc0b10010bee35d3d8142122379f949728f95fef588ae6c21ab1c101804d1bc7c1968e6c3a61916387d967b3b6057bf6acb5ede771068fd6e78b5fe1588652a5956e30b64d64f59eefc867c963a8e812fea94d66a136cfd588ff2e23b26cadb8b6a7f7a1efa7061426d666f3fbd09cdbebdfecf4f5c1c83ea39c4748ff5f2d310c8b150a1cc9fbd09fc0724d7a054a9bd6f6913586cb6417221206ba2639f1c97f301a64a994f7bce0bbfa56038cd4dadc741922db15b475eb758167e20f748401108f49421697aca4dc15a0e4ad14164630ec082b93362540abe04714e876f0a263c1f846c03451996160da5569b600b7c4514f2de7dd065bedd730352832c53494fa983e97e712e620259f20907c7b8784508830a203dc1a8ffa77d1fbf66574c2f9081e290056c413dd474d9dd6b89744ae81232c43e4bed449042e67447acba0532ffeda9746996f55a084d4c8ba1488b202c4080b433ac2d26dd5cccdacdeb76946d321d9ea421c0a7dc99da1ed9a75b076c74c44dbdae6be1136d38ef6849974b240af65c7b7c80d8486fe0c0d66ff6d256da4235d76a6132b30771dfd6583bd932c33fe28c8f4897b0df9daeca5dc5d4b427c72b2627b8e7d7021b3ac10e0ed5442c59978b69ef76c8da11d9ec89a0f493ca5319e696e21d39201c248bbffb4a98d10fc156c9819617ddbb3b86cf44c3eaf141463dfb7e58b5cef886ceca6174a727e7731c83e3d8edde117ea9affb66b1729841e4ed9df87d80d779b03e860fd0cff8990af6885b437efb8fc3dd6c7ff11bda85a0ccb208694cd0d2986766c54611b2223286b7dc74e0441b37e2e8af56ff7262ef5f52dd561061194c53499bde0f9dbd3675bf50a0d7a63f6962ea6b1d1b9f3f49c131d8abad565637418e1ead858afdcb5429a7426a2ca3bbc7270e5c8c0865d5307b9661ae9a3916ba7b5ba8a53431325ee6f76c4188a0c96a2ea5ec9fc197727e7183be7aba28194ad8e3cf24890a988d96f8a4e1cfd9f7c0de5e3260af43d04fdd7f6cbaad21a19dda42c033885d15edbbb9bd8dcada94f4d254b74e1382e3773523f9b7f9532e87768f5d396c1051fca0df91831ba64e105d8e25026f462a749962f8e5265290b1a390871bec638ea547ac434ec13cddbeff09c804314ca4c9fbf9aacaed05b6fffdf1ebf461f41bb6d9585e04addc4edd7b58a3c4e218e10ff9ba2ff70d9864868c6b98d570a0c5f2b944e65dd71992915bcca6ff4d5f66351d3d705f3dfd8b98f36b4dae210c808695a6b28919e0cb822aa05172c3d5ea0fe56c8db7b1d85ec1f927fc050171fbca8b84e3ad3a3c82a2daa79b285a68dd5f84c354391b558b3ffe9cd80a3d66b832264d1d989993d075514458937247b8046eaa65ddd138228f0b026828bd2ac0512826ef4c7a8491976f301d026960c777206ec12e6da033cfce0518f6319f112c0fe6029765c4b1f45c2bb72464933809e478e2acbeddb55ce6a1bb7f99faaf1aeb613c0abe12db31a5365adb34d2f971c280cc60734cfbd90997dbd8c68816256013d6660674d5fbc3e7e22d3b9eef9a0e8f27568a7ba7b05223808b38fe9bc4e7e7984076b74760ec3ddd3116548e62ea36c4bed7885819a02c9b9f995856ef9160bb6bef00dbf818e4862733c1d8338ffff2835bb147314870b20495f55ba2ec5a4dd2d2e8bb46704f276e68f1d04da8e19445c7868fcb3db9b739e690dd9db0249bfb7884b876aa1cb878498627ea0bd1fb73eed0d55e93ffcae2903d9ce1abb11592818cff4a9e688f708d925b3ce789d48986913e0cf218d651339bbead6f8db04acf360a6275baa4d98da31e83afcd60bdbf7f0e8ad82c50402efd20cf018959b186b69d93ba18026ac26a4a8d99571cea2c5fb0b573666ae3384ac0b42b800e963a0741ce2dc0e6ee5ba9004c495acad0b935fc4b8a20214f3e8c9b8f7a9f1243fdd88c043f7725f0d162723527e0ccbf920769eaf07458ca94a5fad50e2e8586fab44757226930cdec3d2151e83b2ba971a500d8e903d9e71b4f77b18bed039f5faa8fc289ec35941c7605555c1b515a6b376f47b20924970f2de489928e3f6c5f5a17eb97e4b805984cc5fbda2084d8f8031dace1f8cad984ca0dbc90bd5b1453b953fffee4718eb87b4c824e3968c66bdf4df8729a6d91e2895de7c0ca370ec6083319b48e4030b911fb4371c3c6cc9f5b7609fe4ec5e13f46d644d1cd65f9518ff45fcf30bfc288e6028f7967672aeaa845a9962341bf9583bb72b388a3976ebef720e69069d44300c2e023ecaf7b366ed60fd346b7178e6cd60f324bf130956b295877424586e376967f085c4cd120b23573a6faf6bfeb817d5d9764eb8bd26d380f214b508d9d8e16bc56da8ef8d2f68d51effd41f65503638164bfa1311e46a1c4c0cc3114860ae98640b2448e1b075ae1e50a776d92b83bed3cf55bc712b2975b85903a3bec9d8fcfc0574d16f4b773b8173383515dee3b565c968c74d9d4fc3590281ffd9a5cfd9cbb8340b7c69aea9b70b0e80783131d39dc9b0b3baf2726be489909d683b2d605c85510ff9556d371d26cc726c197afac670cbe3e5158d12125b6c60e686730e116cc4053ca26ed885e991250ff24c8ad408efae8b7e9f3e3112694ce52f1bfa2fb88122928adcae938bce29d7001ae316dd3367eb240d04bca771f44baacf085dc9309b0afa3f50184c782748403459809610ed287bd45f08ba864b92a350e16b5b44e17ea8323ac758c2e89d85d43423c6471c90013c4bb12d5ec9ca0564facdb2f905b661a922be4e21c6fa1219a642653f54167a80c99590bfa49d005ee63cd09b5eece7b9d87d0dd5acfe0e6739efd45dd48cb3c0f962147006f8f7e4024928740fd1adaace5396a4f3b4c120d8889bf23a062555d7488a544057e89697a542df577721e6ed8c76d311903673c699408c16f59ad416b558a715f73879389ccece5b7426e04b219ef904ad87524c09e72e1940c1e26ec6dd027cacc4ca717e7a95565c804e2667e7fb77658afd8806d3396d9325bc67f7779ed9cae6b441ff4339fd6d92949cf998f595f8b91f1c152418d5a40a402c531448a0b5b8693bf00708cf87bcc67db14cd68fa3de5a7c29f584bbdd5e1a3093dde6071899a3e672febdfa837d6239701c9ed7a09766582f8cc5f25c79073096d2a68ffe637a1a2c0732416f39d1bb29350cbe5ca4d6386c7b894885c078abfd2206bf75ef7a3c9798b3eb03e598dff94633e5673f200a4e434b95e44bb9e6db26a7fd54636994d3bce4e3ea7bc37437eff13d7bdba76a570b0f508290a7af36902a81db69336fdc0e11fb626cd65589fd8dcce4eafdeef205960bf8b3ea4951b39ec2aa7d512e044df29a72ef7ba969d56d8abdee98583b2f3e4058defc32bff88553b292fb5a1d67d332b2f06cc99eb3fa0af345e18ac2cb372f02faa4a6e86609ec1c6bb72078d939558812e2c615e449589302434d34efa5843e26fb07802a89bbaebfd88a34ab282736ba0cbdcc6207bd07237cbac3b666a91e80822ed0f210ea826f9fc4216027d0ec8bd91f7d0f09eed032bd0aa04ce45abd4398da75bf80af51ad964183a16d07f0b7fb4004c00a94355a23adf2dea543ec303159fd58000dfacc29fdcd474902079d6e7834fced921f7e09ac0a1310fb6e7b356914f7848e4ddac1d44ae269ec483c7924ad1c3d289042a3133429e29eaf2366487a09f486c4d8ed3707761567a993824dd006b74393db45e9b9f677f8bfd8c6b423ce25b56354764dab1a86a5724fbc88a9830a159a2669849a997ec8cd9717222235d9e1336c7e7e598116bb45f345d645d16aa7736eb7c117a6f27a276a81a9931860f61d6d73b1b7ca4602148c5d52ff8b91ff36ac37df6d7e18bb5cf31204356b4bc2a3cb657c0e0da3d43ba32d8bc7d6881993918bb4f84a35dbdb2cb82c23c5afcfa7396ebd01a90c7c0783b15a274c3f247dac29c037185d3a561af89f1deac7133de930969cb0c928c15e79a1668c2fa0a56114598a9339957b0ecdf55adb8cec05998835b33c54703530366eae11a5e13324032e5fd42aefacb0e87656b3cbb3081a7f3aabf814e68447f35f8eadff6bb5f4d33b7a531c09a3538a5d6487f40bb70d602996aeea6274835d0ea4250b91910abedd58aa6b094619eef318d414e58ecd963592bc84e135a3ec911fa002bedc314b7083ef9d1f7f304ca799e4a41524d49cbc0f1a4175699303eb7f00a32ed4b5c5aed0e61a9ed100bf0d4b74ef54922206453730a0dbbbb9bca0c82f663f0885462837452cb6cee05a15e1c1b294854ac2048e219fbdeebdf2de106d1e42c1ea8693aca73d4a92f29b4174a107edd446365e6b6f3f93e462c8c50115a7de46ba93f44cf369e7b9537d4aa38776a210453545b9a2642621441e4af454ca5d1ec2942872a78711b3ce1aac1e3eb0f79ed96586cfbcdc1ba797f0ed365158010d2bb87209514bf126b591e0a78ebbfa27efe29072b355139701dbbf5a522a1379b0b96a3ca79a48dda9fc61f638a3497c62eef9bfb286a335bf3e9c1f45fcb52821e0ca6f755b34049bec56ab1436d797b96852e6994746b3017e2cae413847e07abe46b28712f14e305737b994c606735b0370b9678b8cde9d896880558a797afbb6a0eeb6097e62c2dbdee69210a9ab87039fb95df072ba04c6aff75c7926033d1be9ab80abb718706795f671633bb0359c3e6de2a951c6e0558acd16a04e8a1c2593cc841a8c8706670e204ce84ba9ac26a1f1f0c7a59ad6df3511318f139ea5751831f84d632ea3b899ac9f2cf7323690371ec80d7495ea3dc24532d28a0d4f9066f87cd72f515b4c496d23ac58d0125507269ae73e2fad01f66ca69127df890408aa83ac19e66d7f813eddea9223642e35855fdaf8f4cf975c9cc2745bdf7bfaf4e2a5f292faaa3d6ed2a4a24cef45509454f59ce98784ab3efb5cb536671132385c1b1460d196bd80923ca53b09370131495d739950ecdae6f7978", 0x10a0) [ 487.982435] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 487.988623] b_state=0x00000029, b_size=512 [ 487.993192] device loop0 blocksize: 4096 21:13:09 executing program 4: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@broute={'broute\x00', 0x20, 0x1, 0x260, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x44f) [ 488.092643] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 488.099058] b_state=0x00000029, b_size=512 [ 488.103359] device loop0 blocksize: 4096 [ 488.247859] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 488.254070] b_state=0x00000029, b_size=512 [ 488.258554] device loop0 blocksize: 4096 [ 488.262795] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 488.269053] b_state=0x00000029, b_size=512 [ 488.273287] device loop0 blocksize: 4096 [ 488.287058] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 488.293391] b_state=0x00000029, b_size=512 [ 488.297737] device loop0 blocksize: 4096 [ 488.305714] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 488.311900] b_state=0x00000029, b_size=512 [ 488.316247] device loop0 blocksize: 4096 [ 488.335386] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 488.341618] b_state=0x00000029, b_size=512 [ 488.346232] device loop0 blocksize: 4096 [ 488.364123] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 488.370579] b_state=0x00000029, b_size=512 [ 488.374823] device loop0 blocksize: 4096 [ 488.396724] kernel msg: ebtables bug: please report to author: Wrong len argument [ 488.456515] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 488.462717] b_state=0x00000029, b_size=512 [ 488.467067] device loop0 blocksize: 4096 [ 488.471371] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 488.477600] b_state=0x00000029, b_size=512 [ 488.481839] device loop0 blocksize: 4096 [ 488.485921] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 488.492441] b_state=0x00000029, b_size=512 [ 488.496739] device loop0 blocksize: 4096 21:13:09 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001500)='./file0\x00', &(0x7f0000982ff9)='mqueue\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000140)='./file0/bus\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB='\a\x00']) [ 488.566906] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 488.573296] b_state=0x00000029, b_size=512 [ 488.577618] device loop0 blocksize: 4096 [ 488.582387] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 488.588854] b_state=0x00000029, b_size=512 [ 488.593098] device loop0 blocksize: 4096 [ 488.690662] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 488.696901] b_state=0x00000029, b_size=512 [ 488.701460] device loop0 blocksize: 4096 [ 488.714960] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 488.721570] b_state=0x00000029, b_size=512 [ 488.725813] device loop0 blocksize: 4096 [ 488.741990] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 488.748173] b_state=0x00000029, b_size=512 [ 488.752495] device loop0 blocksize: 4096 [ 488.756575] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 488.762780] b_state=0x00000029, b_size=512 [ 488.767016] device loop0 blocksize: 4096 [ 488.784426] __find_get_block_slow() failed. block=1, b_blocknr=8 21:13:09 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="2cfef251f3a7720be4ceb8b35854ca7a150baf81613265a7ebd2881c22046b9e582f7933575510234b04090bb7e338f5bd0498de4b3ae9bf673f749d52ee4aee9156b84e6e699c752dda53812d0268a54ed4be69ef8b8c7e31aba751f3e34537a32486da8907fbdc3fbeae0f890000000000000000005a926124b2fff5b9fdee0eeef022345ea8f6db04a4076c1d89e6f72c05758deba7df675db8c38a4f8bc5ae0cb99f34d88606aae2e5f45f596cfeda781357c017cd683b9d059d56581fc99fe25b6531a54fb90fe070aa0165cd22061184336b580e4d2b46d7f5b52af278d29f27dc90f14a7f4556742ed5dd569626c1290a42b58c3b7e641cf8898da1de364ffd827b2b590c9e1b18969c9ac24cf71af43563d44470e5fbcecb24855fe2fae20dde43e308b83ed0985020a68d3ca25341c6191b6613f8887a7bf8d93ace30ae9a9ecab4", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:09 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 488.790788] b_state=0x00000029, b_size=512 [ 488.795043] device loop0 blocksize: 4096 [ 488.800168] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 488.806439] b_state=0x00000029, b_size=512 [ 488.810954] device loop0 blocksize: 4096 21:13:10 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2008000) sendfile(r0, r1, 0x0, 0x80000000002e) [ 488.890601] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 488.896807] b_state=0x00000029, b_size=512 [ 488.901187] device loop0 blocksize: 4096 [ 488.905275] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 488.911750] b_state=0x00000029, b_size=512 [ 488.915991] device loop0 blocksize: 4096 [ 488.920680] 9pnet: Insufficient options for proto=fd [ 488.971908] 9pnet: Insufficient options for proto=fd [ 489.051923] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 489.059397] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 489.065706] b_state=0x00000029, b_size=512 [ 489.069950] device loop0 blocksize: 4096 21:13:10 executing program 1: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00\x00\x00\x00\x11\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:10 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2008000) sendfile(r0, r1, 0x0, 0x800000000031) [ 489.166004] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 489.172262] b_state=0x00000029, b_size=512 [ 489.176502] device loop0 blocksize: 4096 [ 489.216379] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 489.222775] b_state=0x00000029, b_size=512 [ 489.227024] device loop0 blocksize: 4096 21:13:10 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x5, 0x20000) sendmmsg$nfc_llcp(r0, &(0x7f0000001b40)=[{&(0x7f0000000080)={0x27, 0x0, 0x2, 0x3, 0x10001, 0x5, "f4fcdde709a55b19e94d23da1b72448256b9474aed4cd7ae73f3dea303ace81a87b59f5e4d96737e315b0a173f0c798eab7c7bc337f8e438aed0ae3d1c881c", 0x6}, 0x60, &(0x7f00000004c0)=[{&(0x7f0000000240)="1cbaabb71e8d562d5230602509cd0d3c92f0c126a6850f03bc9a245fc4f241ffac4188b873148ec8f1477d55c8e9dd1e3269b37ce0abd729946f20170d12989a26808847d3420d669058c47e3160ecdfcd67b691b7d92b86abbb02f528baccb67fb02f61c913c3aa22cfa130253c2f5b621e1cb85466090b39845b14ee0fcfa66bf59872c352cb8e686915492663b5b837020b2efc69f8ed326307b8f331442166c168230c0a6d7368d7ba869e6dba78707a5dac99c31549b64b71e5ab85f9cee3e069af25dafda58c690aa1506ee665d31f76d444513dbe4b4cdba5bf2bab", 0xdf}, {&(0x7f0000000100)="740ae3e6797d6c9e2e630b1166fb56c6258630ede4ddf92386414eff274dd57a74013941d627150a0a8a2bdeba83e703188c2cc3f0504c583bef7dc9ca6c4a101f01a54ee0a4d6be9498b3494bdb7c643839f324ddb7e54225213e833a8b1433d62f0e0a8db5f74ac98c96a0eeee9772", 0x70}, {&(0x7f0000000340)="830f4c30b5e26ceced52c9eeb88c3a7682d3e33b9f65225d435c5b6a41338079a70d4aa7d9522a39d09e8588a11b98062c30781152a5770ac70280d31568a6d90b705435deba49ffc13a2d6b2622121e8b570f189a6b71911c72ce897aa7169966afe0080e1afe0da33f21385317de071e89b8947d73aabe659fa7a62c7c49678d51ccced5530ccdb5c758708946629ef27110acc351ad01e2598b492221cdb35e023d7ed2da8a0a7727518d736149c8ec9bef5253", 0xb5}, {&(0x7f0000000400)="f7d6ee7c32a4c0f5361fbe31bb6524737902959e5a479be2e50b3a3d9930ea6270a76d6ff6f839885aed3ef26d3112ca0f53631a89dec6e5709fa1efdd265ed00f3277a89d4f2a548e2146e11295ffb822800ba94329093a0cb1627d90dbec39f929e5b9b0de32c085868f7e5fff2a149e42089cf2f9a6950770fe92242f1a1416efd0ee3c1efc43dd55c5e7316ab28aa26229005c5d", 0x96}], 0x4, &(0x7f0000000500)={0x38, 0x113, 0xae, "b8d9eb491103ca1a90942c5dd3f27fb9dc712a5d10d1afa93f403a3dfea140540b"}, 0x38, 0x4000080}, {&(0x7f0000000540)={0x27, 0x1, 0x1, 0x7, 0x4, 0xfffffffffffffffb, "de4603c04db2452dd820d26b14395979f7c4f098cbea1ffb0cdd35523bc43947ef8fc5bacee5e1ca9bf3dcab283c5db6925adfd6b4152f8cec1fa45687193f", 0x3d}, 0x60, &(0x7f0000000800)=[{&(0x7f00000005c0)="d8", 0x1}, {&(0x7f0000000600)="d13d24310baa2a40100eb3ca4e98c5761f745df75c08f11c9e896c2ab63751ec", 0x20}, {&(0x7f0000000640)="72a5680fc2cf56cd2a5cfebbb88058b6046673f5d8b18480a02a5d4d12f8b3736079bf6dd42becca72bf5541b7466d9d4ea20404c56b2c07d1924c10b1be01537991fa9bec0913bff834a2b68f6749d8fcb58fc0215c2f5cbe2d4ca2303ceed788b83d33b239551937a7b8ab02d37810d8c287435bed129775893b16e2679c2abc0edf2005e5774b0b865197f02d1f3baab0d9257d8ed7cd23a6f83fdf250c6251158d3af5c9df948701da7a2f38671c37e628ece2c9261a9695cacfae6ef8ac8f376ce64a2f4957edc0aa817b482a6c5ab24f5ffb78cd7f5e305019d8c6", 0xde}, {&(0x7f0000000740)="99a47effb1b43b223f572cb7abdbb54c82981d8c89d8fa4fb9a0ec60e0b66b34e5d83a96dd94bf8ce9e7f3b7111039e10744c2575db23bd8659a98eca3e3c95d71d66aed123ade6edf1cca7f25c3c2c7c494494c9b115d6a14ae336715167cd0c54aa253efbfbb2817745fa5b07624", 0x6f}, {&(0x7f00000007c0)="3dc5f5431f715bb133917ba14202e16f3f9f541cb5e34eababa25a518d1a91552f2c59ce5d893639ddda1ce78e00a9b0c4615831efed3b716d81", 0x3a}], 0x5, &(0x7f0000000880)={0x20, 0x6, 0x2, "334cf4dcd70bdcb245fbde57"}, 0x20, 0x8000}, {&(0x7f00000008c0)={0x27, 0x0, 0x1, 0x7, 0xfffffffffffffffc, 0x0, "455ad2ba61112886b899d4ab858acb7b73a6f68ea0f6b8adda590dcb183d44645f03a304941da588d52fe756c42d8ad50d8d54908630a3a0a5e54e833c8896", 0x38}, 0x60, &(0x7f0000000ac0)=[{&(0x7f0000000940)="b4be1c6079879b381224506da46b18b7bc59f1e34ad2e02fecb3d7dcb9f223ba4fba6bca313cb7c7bc3d9bbd4af4cd71eed4595a4edbab03d92553db730ed9d8b76640dc5cea71606961fc668ee9c93c94fd0d1bc36e7c6f176ab3ea31a5a975d648f123d5bddf419cbea455ceb206daff2a5b1924411ddf77f12348b9363104ad75308e5f02823a4b232c82e86bd08780fb459001c79360c3c2b33db5d3c16c7367570db4394e2bc9a150be4bdb22727747806d7f2be45d04b35731804b67a21c826b0ae583c28170b422fe3be49498bada91fdd6d702c43ee7bcbf32635eb37f8a59ef0b680a5842832aa17ff7", 0xee}, {&(0x7f0000000a40)="dc20a3c111d6e80883c8ed4ddb86ced1314c63a22d4cfa71a3d41d545f7d9dd5ffee65b7664746b98d6c7ad9fe1d6716b8d1bf62a9023148c57a18ae288cc7384f6b2005547c0ef473e976739677668e7a5e32559e954cef39050947a8f4b2124d44d59ce8d459532073", 0x6a}], 0x2, &(0x7f0000000b00)={0x1010, 0x10c, 0x9, "d31607030d97b38f177fe0c45a2c02439cfc0b1be3671796769b234bc56c778e56cb12de073ac58afb7ba60165f049881af799f1d3a3a6bbf00bc446f189b072234593553e5580b7b431ac12bc73c29787f9d76bfca14b666c78a1a4a14fca09611d3adecf3fc080f418667eda9dfad3be34eff249143dc8c9a4d5371b5f5c94e4361132c493cb0f15a4ae5de1d410ea8f7b6b13f67c0bb53b32a9814314e0666b876cc1f23b9268b4ad4cca7f5a9be8871eb5d3b4fca30cf951485a8ab9e12a0c3ed45a842428b3582a332ff51523c2aca635dde31fa08358731efd7cf6f613e2d09f7aa38c16197cc6e9cb02f4e886418ab114e0d54f7897a8702fadbd5c3720e67da38d1778b826ad68f0cfa59237cbbfcadfe0c789d74967394b8e8c68b90b583aa7d92e5ce50764707da6144822912ff166ba7b489e62b2e2e7dec2dabbe883589557628c70f78409d261b4f72ce23aaf473f6ffb292c8b799d359131a2d823b77bc1cb5352406ca2fdbec590e7e8d90f5e268975f185a28e970c399f7c0d0a571b74317f0d4f4aa01ac81c27f0f4a7f8c57079668c7b890c066a950d5e16591cbbd142572d27b27929eec23fc4c36f3ac4f27387fa0ad12fb8d465de5e69f8d3d7d1f0e038a5b32cd9586090e4ef4b26911ab6888667d7b58c1f017e2e1bef29607e62163ee6c24f3ea13d07ccfbea536868f0679de74ef7362fa5223481b22e85313434cc166ca75f946523a47eda74ea1e661695203d6539b0314e9569138444f88ef0159f82b6a56c94e1e4c7ffcc231e4cc5d44c96deceaffbb3dd6f8169f66f01233c50750026bd7aabaf153ba3cca2f7d27d7ff6706492b950ca42ea3ebddef3ff12a80d50d4ca37d5cd9ee43f9be3d961caed63b767693553e7b3fbb71698eb13716d2ca3f48755c2ba73a7fc2abe1bed7019149091a4788f4b3588fd361af0301bbe289bc8792d2d9458edc4185d1da8c4a6c9561a79b9cca1e2fe4d0903b3f37b13714f0955cf389c9258ea1deb0eb8aadc7aea4739b4f5751a017eea24e5c59e2a1534976030eb0da9870220dc891852709044925381a3725467ab46a3fb591c4a34187690ca8da9533685e382d5412e1e5fc73118759030e35234f80f46196ec0536d5b4fd3f4fa3b9ef1676499114888be7f329b62a7c3b5667a6fb03565419a3662e1c39882f46820954acbbe7abae5c1a4ade41ab2cc9693de30e31bb0f92be7e73f0925f11b8a0dc91e8567cb4879e258df6133f1e026d98b19c93fbf692e5ee05d7bb157e516a4617291e18a76244f1481b76211aa3dcc3d538d4b8ce5f522e6f2469ca47185e4cf3da615195da737c5d05aaacf06b8106986e4b170e83048c614e009a1b47af25c749379a4791ea1095b43f44c46a7e9745f4f6b1c07f57c95b36461a4ea1d12c6ee648b724127371b9f2d6e8f0166c543d46234b73f04eab93255924666e28f2c9eb92bf663ee79eceddb6e28f7a2270d57d3620de7e14a391f92a95a7f7c0ae34faf97cd814675e08d5dcd0110ea65ff70ca7bd7f80bd8fd206fa32fa2ae08cfe36018d24d8f916c9186e5cc03a696a6c77f008b90278d20391208be30a60a7dfc97fab0d0379121977157ba5a2f0e51c1ac757d6acb3087c5734318b8e0f2fca9658e140b000d2c90592f8fc667809bd074b51ddaeb2476d1fb621126e5e198df4b5fc90cdc658679ab9667e75cc4a2ae30a527c16af70c90082f786eeaf8ac4c5f457b5e4ce7b0304a34f155b03208f560a6eb12a5c19690b105afbfeda313337b3cdb351c860e392bf3acd9721a49e0de94a63069c2ff95cc5a03e7ef2bdea0f20bf85d085b0533eb2134296530993052ada609d53d8341bc140bba4f8d44f9658c0dea61cc9272d4871e7481faf508357435f8967a0c41bd48dbab97ed85dcf9e2cd48884f6b50a21316830a5a4f73dfb9351c82a708fc5c138f20392c7a289cc02eaaefefbf39afa239a283db038c43b1697124a4ed716b6652f6f92176b65abebe06284b6223271a07cd1f5b62addecbd0ae4162eef028db23f7e7fdca678fee6f039c90d25bebae2ea7b9c4127cfafb58f4f3c3a5909e9cb2f1f525e32715fbeea1a3c3d66ec3f90f9e477511768c1eafaabc2d452ce1a21a08fa11a49ad6ea1c0f61b9424df2c3afec8c2af7a17e0822d158027954d6d06532be4157f0f5f8f24e682f9359409c60bbf858b1c25262f429a6cf70e53d8dd6ae1bc1a42ca9f726c5abdf99c736085ab3a4c3ed936481930266f77ff6d479723b8747e95993a7b55c2fb21a3aaf4c4a4171dbc1e810b122d1324281c1e2e97af81236f9089ed51d23966f95e36b850b324747834d8baaa710f4280f51e20922b5ac672ab2241032afe605324a3f6d763d5cf891413132b7c9de256bd2c656bdb5d6ef3ec2c5b1195f40adf375d6f5dfc98d8ec449671b7f9790bcc9e564a9ded4b237c1a976abcc9086145a16e759f7e20047e7909c9366bad12b884ab1dbb2f090441f7705a129afb8e9be9f5b7069818895e2184ff4c40834d88a3eaf04ea95ce250a42004714fe37df7c24eb3db8c2f760ef88951dba5c4575bf9b88b90b4bb3a5a51108cdc0401156ffba192ee286e124b605d29509cc86416f4bcde5c84856b8f669d040b7af897430abea8052e456d127c8ee3ad81e1f2e48e694b2343a6d507bb4f3090e2b2d38756de31612df29ab664bb644def3601ab052f876405abf8c41e8da989409dd869be3d9017da3b0a16f5f275908c92af346ef931a180e2ae1d48b23fe7a3f194a750ee5dddac81025621d7cface9c0748aa5089651519f608b7610a96c56f864ff578889d4c61b0b5c4045adf1cf0347386c67c3a50f00377fd424f5a998f05344eb065b8a8d24bf2f2fe43d54f6b11a7d9e67b7e68507e53fc7207bff76098073475ecddaca359e0a1053d593c08c2dc6f1bc19d2eaee7da88058484bf5e1f1ce48295985852c1c51b322fb7777d6e5682e15c3336dc9885be8cefefa56b85c98f620f7dd255734e597571f3120fb202c9077c50b31126adc11dc0e089414db2888983f56e2d931e12cd16e732b4fa9d1db2fab9c52ea0cdd71042dd098ad2fae2e75b532ae41eac20a66a6d9bfa005d7d6f5c4b3c05eb99fb0307dcb6387b442df53cde5c89e9eccae43c45d0ad819a0b58f760d5edff092e00f3991e650b9d2c16d594975d607955420bb2a7ba9795a1d881ab53f9c8da68e8158c8e03f667bdc533f378ace895b82e74062477b571061507236e7ec18ab5b8af5c359019051cafdb5a48f6df439d648d8656871d61ec981fcbb25edb1b8a18b10ae9c21d1cf35675b8802ff5cf6b2499ea3e9089a867955d4888e997e13c20d359672f662cf6dd52c5b5be717a9e0e81b4f7d94310073e66f912a17a7e9059bd86f149ee2f27b4443512aa721636573b7a3cceb60d4e11428e4122d2392f1b9bd728430bf95837e0dc40a65257d3aaa64ca990cc4246afcd239b809c1516f1e6221d256f310868f0af3093d61261e93ee0fbd566c42ac2a87118c9d964a0bdee4b70fee5f708ee6f0a3ffe996654e445d28d7e7fbbef248c15ef57e9a2622fdb9fbb844133797bd9ff4f039b383a8f421d56b8f63c5650df4b01a28ebc20db2def463dc22a7fecf2e1eb7ea323a731b37ef83cd8c355a515f1733efe96a4a7fb52f5ddd713d974356c2c62149f1fe5f8cdfa1e35a3e27091c5a884a6f211ba7f327944c4d858cc4e051ad3dc89df7ff623c478d63f13715bba1633116deda5cd78158fe07886f41c129d6c811c83ceb3f98eb3255d4ae85273e3fa85fa1cbadbfad95ceb9b8fe4a99ae102e7ed6b5fd31254979a8ddbb46b16b9d92c11e4c2994bb72e595ba4552c9f790ecef58a87e4f832d027383885b8a3c15640973022c9c7214987ef4daeb8169fabe7ec32b6a520006b9b03a903a73438e0cc717697c14f5c607961a34a77b6f90d040948cd9d779abce1bea3d6c616043a9d963c426bf855d1fd2432932e3bd4ea8e58a15d21fe9cc8d8cd83774cc8ceea88d2239bcbd1e304d905d92b3aad4ed4b854d8b05aa20d8d7378eb5a1f8965f53d7c88347187d1f185f3681663097290195e2186c1a4aa2eb5cbed5fefbd84dc5d91428fdc2bb3dd7ef3efeecca4b0f576aed27a2c240033f0cd10a6bfcf7178870c3535d89cbcabd019b4bfa1d2a2d9c9f01fb5a41a8b62045231ec2c328378e3240e3fb83a42bac3916b2d7a20d52a54ca1f65779124fb3f61990a4e3f40f48d5f4f480ed64221ff4eed7cbbcb4e336d77ee6b9d0696d856d600903cf93871e51708cd8dcd640b64f33a8ae0e8db8b37a01b1ce36bdf28a2bf11706e133795231afa2fefbb9c0aeeea279485f7a9da4dff7f7a2267cebc9627e7da054705ae4f2e168fa892fc81bfe1bbf3828cc76750dcb7686d595063bfc9296640290437761b84b45016264ec1ecf3c45a6e8d002e780bca52c840c82ddc43486165ac014d3a3a4f7507e16c5935b8e041db3c280005c3f50dd5688ba1d49804e040e2ae8b1b56cdcd2202d746c9414612ec318518a7f12d03d3bbf14fb38946854a5649cbdbab9ee71e5e503b5d1f7ff247056002c3a304637cb319fad703c7e79054e7984170eddd8c200573c556b61debabc210102d02419c8a677f4a373fef9fc6d32d8931ca6676628173e6baa92b1dfc1f5f5176dbe0e264ff993fa8a6a199c1079c1c63b5689b9a398346143d10e722068bada2de28228cc3432670e037474dea727d22494244b156abe4d59ff0a4f2ed9a82e5bbb0a9fd988469e46328ba6c94d8c77479b7c9b9c9c46314a11d3a360940bfe8212bead2080c64c2badb5ea92a966aba77c3a8993dec5f6f7284364f3a5aee975b4d11cfba39ddac04a810c5c4fa24a08fc6f0d942917bffd3b12e149a0264cbb06fdaaf754f312461cf77e26f02a0db63b4d4c440e5b7c9ec50f8db70a7ec616c43914d131b29bc0e3d762363f144527f30165a310ce9c6cf6b9885cb966abc9d12ddc010d2836b16858f6433ce4546059ffd485a80340ad911927890c34d3ed6e4f1d967d4a4d3e6dbaf96e0436e902f15239d2890056d22c776c415d2bc82da468c96d99b1d51637d51dcaf66daf5b0b46a438b1230a32bab857aba6160e9bf4fd81d072cac7512992915d804a250738814b5628cbff3c54b0345a434f4e458e497f25b88d6d382b555d059233beed8ddc7f5c0f233f848b18439f62a16e4ddde91653064d43975b989e49f69707d40ee4a938e9bf4d02e90707816a1b18c0ee91653990bbbe240fcb6658bb686181bc69628706143f67ed05c7810e70d6a2e2bf49cf11c28ff2b51fdf928aae23bd67324fea749d309feea799e2469b53a5f5598a2fc06a5eda6104e4611e6ec378abf15b506da14ca7e02b7147cdabf7349d95aef970e0a7a902368db436b6eec26f4434214c4f324c52ee10f99a3e772f3abc83c97ff94cc54b31b5d5d5743aa606766920a9ef1d46f4e2813edc094dc374d3fd2c2d6497093ca7259a844932b4f35b25a90eee655a02f964875297b7e3155ed144fa23565945f0d0be2c097aa4cf37ed076a29d14e46ad75c5b07c61a16fa698b39e76214308fff6fab734c6026228fe711143a742a19ac767f224e2b2de9ebe317f88058f8e9fd0451de152a44d8a2e018fc1f5cff7a33bfa64a9fa84306999e35d524fdd1dd79870f7aa1852dd7c53189518c9b8461a1375417413e89e842de3784f5d8b20eb03d99480a4500502eda337706789fd425e949"}, 0x1010}], 0x3, 0x1) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000000)={0x1b, 0x7, 0x2, {0x12, '/dev/input/event#\x00'}}, 0x1b) write$evdev(0xffffffffffffffff, &(0x7f0000000180)=[{{}, 0x17, 0x2, 0x3f}, {{}, 0x0, 0x7, 0xffffffffffff8ab7}, {{0x0, 0x7530}, 0x17, 0x0, 0x3ff}, {{}, 0x12, 0x0, 0x93}, {{0x0, 0x7530}, 0x14, 0x4}, {{}, 0x0, 0x0, 0x7fff}], 0x90) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001c40)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000001dc0)={&(0x7f0000001c00)={0x10, 0x0, 0x0, 0x400104}, 0xc, &(0x7f0000001d80)={&(0x7f0000001c80)={0xe0, r1, 0x120, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3d}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffffd}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x100000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x96f}]}, @TIPC_NLA_NET={0x60, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xe63}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x20000044}, 0x4000000) [ 489.257208] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 489.263699] b_state=0x00000029, b_size=512 [ 489.267938] device loop0 blocksize: 4096 [ 489.298604] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 489.304958] b_state=0x00000029, b_size=512 [ 489.309204] device loop0 blocksize: 4096 21:13:10 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = add_key(&(0x7f0000000080)='logon\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="633ce4a45ac54646c415807f78453b15439adf200df8c7a5900850215e4c6f8bcf5c8513cecc9ff7b260a32210edec4f0654f27921cc89178551026a02d8a92b6716c2de5798797be61964043d5589faaddeaed0198bf78dc94a1ca5ad695379d46dc2e733e2490ef5f229c4696e587df5250ce3d9eb7f0ebb0e4a0957368b44b12e44c218be93b0a0ec40316e989ccc7e6eaaa6854914ccdac283e3a43c82747d5bc505e81b727b0b948b08fc2ddc8a9697c3d81a71f8ac8fe6cc463bb119d9", 0xc0, 0xfffffffffffffffb) keyctl$describe(0x6, r1, &(0x7f0000000240)=""/182, 0xb6) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2008000) sendfile(r0, r2, 0x0, 0x800000000031) fsetxattr$security_evm(r2, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000040)=@ng={0x4, 0x2, "1cb7990ce1f7374d1195ddf631d617b542f9d7fb"}, 0x16, 0x2) [ 489.356783] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 489.363051] b_state=0x00000029, b_size=512 [ 489.367556] device loop0 blocksize: 4096 21:13:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FIBMAP(r3, 0x1, &(0x7f00000000c0)=0xe05b) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4004ae8b, &(0x7f0000000000)={0x8, 0x60000000080ffff, [], [0xc2]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 489.406740] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 489.413130] b_state=0x00000029, b_size=512 [ 489.417572] device loop0 blocksize: 4096 21:13:10 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2008000) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r1, &(0x7f0000000000)="d968be0c0efd46de72ea79685f4fcc106d3c016550590885f1fad6d0d45b780bf2ef6e65c2d111c4d1ec9b68130b68ce3002b3774ea16f50bdeb0eb94ff6538246fdbcb408e320f489cca4350bceb0a8fe3794fa69081f31f97d28a2430a00b8b65344ce2312a79042da2eb9da3b016d934a3a8bfd30640fbaa0649cb550b6be6a7ec0620780965ee0e7582850de892f9c084a7ecaf0b67a60b163a0c75fcb934ceb5c6affecad10c9fe5b721810d3524000ea2ca003be80ea1c7a690d5599fe8295a533b27dba0cea8a7abdb0ea60f0fc5c0e8a64349ee20c69d207111135a91cce35208b8e6aba206ee34459154157b5c9"}, 0x10) sendfile(r0, r2, 0x0, 0x800000000031) 21:13:10 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="2cfef251f3a7720be4ceb8b35854ca7a150baf81613265a7ebd2881c22046b9e582f7933575510234b04090bb7e338f5bd0498de4b3ae9bf673f749d52ee4aee9156b84e6e699c752dda53812d0268a54ed4be69ef8b8c7e31aba751f3e34537a32486da8907fbdc3fbeae0f890000000000000000005a926124b2fff5b9fdee0eeef022345ea8f6db04a4076c1d89e6f72c05758deba7df675db8c38a4f8bc5ae0cb99f34d88606aae2e5f45f596cfeda781357c017cd683b9d059d56581fc99fe25b6531a54fb90fe070aa0165cd22061184336b580e4d2b46d7f5b52af278d29f27dc90f14a7f4556742ed5dd569626c1290a42b58c3b7e641cf8898da1de364ffd827b2b590c9e1b18969c9ac24cf71af43563d44470e5fbcecb24855fe2fae20dde43e308b83ed0985020a68d3ca25341c6191b6613f8887a7bf8d93ace30ae9a9ecab4", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 489.460357] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 489.466861] b_state=0x00000029, b_size=512 [ 489.471127] device loop0 blocksize: 4096 21:13:10 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 489.513915] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 489.520234] b_state=0x00000029, b_size=512 [ 489.524474] device loop0 blocksize: 4096 [ 489.594118] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 489.600483] b_state=0x00000029, b_size=512 [ 489.604724] device loop0 blocksize: 4096 [ 489.741214] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 489.747541] b_state=0x00000029, b_size=512 [ 489.751777] device loop0 blocksize: 4096 [ 489.755854] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 489.762131] b_state=0x00000029, b_size=512 [ 489.766370] device loop0 blocksize: 4096 [ 489.770935] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 489.777527] b_state=0x00000029, b_size=512 [ 489.781770] device loop0 blocksize: 4096 [ 489.785955] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 489.792518] b_state=0x00000029, b_size=512 [ 489.796760] device loop0 blocksize: 4096 21:13:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text16={0x10, &(0x7f00000003c0)="0f20d86635080000000f22d866b80500000066b9060d20500f01c1ba6100b01aeed9a6390b0f0174170f009a0050670f01caba610066b80010000066ef260f22276766c74424004edeac976766c74424022c0000006766c744240600000000670f011424", 0x64}], 0x1, 0x0, &(0x7f0000000080), 0x0) statx(0xffffffffffffffff, 0x0, 0x7400, 0x7ff, &(0x7f0000000440)) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x8e2e, 0x400) ioctl$KDADDIO(r3, 0x4b34, 0x1000) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)={0x5}) setsockopt$inet6_tcp_int(r3, 0x6, 0x3b, &(0x7f00000001c0)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000080)={[{}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) socket$netlink(0x10, 0x3, 0x4) writev(r6, &(0x7f0000000000)=[{&(0x7f0000000180)="580000001400192340834b80043f679a0189668bb3", 0x15}], 0x1) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r5, 0x0, r7, 0x0, 0x10005, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 489.989071] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 489.995277] b_state=0x00000029, b_size=512 [ 489.999877] device loop0 blocksize: 4096 [ 490.076315] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 490.082626] b_state=0x00000029, b_size=512 [ 490.086888] device loop0 blocksize: 4096 [ 490.091128] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 490.097319] b_state=0x00000029, b_size=512 [ 490.101657] device loop0 blocksize: 4096 [ 490.106212] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 490.112663] b_state=0x00000029, b_size=512 [ 490.116904] device loop0 blocksize: 4096 21:13:11 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 490.128703] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 490.135000] b_state=0x00000029, b_size=512 [ 490.139241] device loop0 blocksize: 4096 [ 490.148573] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 490.154852] b_state=0x00000029, b_size=512 [ 490.159091] device loop0 blocksize: 4096 [ 490.164006] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 490.170337] b_state=0x00000029, b_size=512 [ 490.174660] device loop0 blocksize: 4096 [ 490.184281] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 490.190492] b_state=0x00000029, b_size=512 [ 490.194816] device loop0 blocksize: 4096 [ 490.198982] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 490.205243] b_state=0x00000029, b_size=512 [ 490.209490] device loop0 blocksize: 4096 [ 490.218278] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 490.224713] b_state=0x00000029, b_size=512 [ 490.228966] device loop0 blocksize: 4096 21:13:11 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) write$P9_RMKDIR(r0, 0x0, 0x0) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@md5={0x1, "540d4541a1c494822cd37bd17a2c5524"}, 0x11, 0x1) [ 490.233456] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 490.239732] b_state=0x00000029, b_size=512 [ 490.244029] device loop0 blocksize: 4096 [ 490.248839] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 490.255268] b_state=0x00000029, b_size=512 [ 490.259509] device loop0 blocksize: 4096 [ 490.271701] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 490.277875] b_state=0x00000029, b_size=512 [ 490.282415] device loop0 blocksize: 4096 [ 490.286957] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 490.293409] b_state=0x00000029, b_size=512 [ 490.297667] device loop0 blocksize: 4096 [ 490.301880] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 490.308032] b_state=0x00000029, b_size=512 [ 490.312360] device loop0 blocksize: 4096 [ 490.318412] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 490.324876] b_state=0x00000029, b_size=512 [ 490.329126] device loop0 blocksize: 4096 21:13:11 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00\x00\x00\x00\x00\x88\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="0749323abe4387662d10b7cd76fa130304000000000000c3c7ca160a7b5d2d82068cfdbb81a6fbf8c375677ecbc21685bc57675b607ac350289ac120719ff229bf6da4e191bcee0837dfcaac0518917528ba1d590f46b5240322c1f97f5c4d8903d2dc0096c5bef6b74708000000cee3d90f6aeb04fa55ff1c31d57645f77192b91cdc62428ab2742c28c1f44b81c71e1041fe412e2568ec39b7bf23bc2bc6568121b0bccf91b3c021816f242e3363a32511b78693f810a75ff82452b3f05889945d412d6ab8d78342575ee059a44b0df78589a0d3d84206481b05d31a0b973f091b08aa4adb561b5c54dcd8cf27e71d58a007a3b2124db2fbf1fcfc1ad861d18691d5a45b2538e8bb8c222996a29fd8f0736e446608ad03d2ba05579c93370b5ccff3d63b3cf3f2cfdb4472be1e7d4a6438746f9862e0e31656f65f9c3f378d4223029e18b18ba886f171cba9bd226ecd8effd793cca2458600f093fa20eeed1a05f54006656856445ae6800c9b9b"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 490.344850] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 490.351030] b_state=0x00000029, b_size=512 [ 490.355568] device loop0 blocksize: 4096 21:13:11 executing program 2: r0 = socket$inet6(0xa, 0x400000000005, 0x4000000000009) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/current\x00', 0x2, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) open(&(0x7f00000001c0)='./bus/file0\x00', 0x40, 0x4) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000040)=0x8, 0x2) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000180)) ftruncate(r2, 0x2008000) sendto$inet6(r1, &(0x7f00000000c0)="055a5106dbb998f0a617532cd013160a8fd95e02c263185128ed23deba123d57ecc16ae8858d9dbbc76098908e7ec24e19834b298def4d987a8f60a4db6ec45dfb645d02c0241a359726afbe2a74ecd67997c3b05f4d05eef940efb1ad314fb7871016954d15c1e1a75980100b", 0x6d, 0x4c885, &(0x7f0000000140)={0xa, 0x4e21, 0x220, @ipv4={[], [], @local}, 0x401}, 0x1c) fcntl$dupfd(r0, 0x406, r0) sendfile(r1, r2, 0x0, 0x800000000031) [ 490.456682] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 490.463046] b_state=0x00000029, b_size=512 [ 490.467338] device loop0 blocksize: 4096 21:13:11 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2008000) sendfile(r0, r1, 0x0, 0x800000000031) [ 490.534526] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 490.540809] b_state=0x00000029, b_size=512 [ 490.545178] device loop0 blocksize: 4096 21:13:11 executing program 4: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000100)={0x6, 0xf, 0x4, 0x40000, {r0, r1/1000+30000}, {0x2, 0x0, 0x9, 0xffffffffffffffff, 0xdfc4, 0x6, "d2f32d52"}, 0x5, 0x4, @planes=&(0x7f00000000c0)={0x80, 0x3f, @userptr=0x10000, 0x6}, 0x4}) r2 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0xfffffffffffffffe) ioctl$VIDIOC_S_FMT(r2, 0xc0d05605, &(0x7f00000001c0)={0x1, @raw_data="d358c35b05f563a5593136a0fe0fa851b10ecc8cbff1cc4febdfc748fecaedfedb242ef87d4c480c9b91d23ee1035da40a2b965bf8b05ce3de70b23bdb6d53c8f4e9989a16277230d4600022248910e7f115c9cbd437363c43bb4e742be3f646a3bb111d0310ab69d630ede47b902ad3d0d342ff5367db2fedc326a96dc6cdac3ed933cec09b089a474f4f73d8741f8dd9c070aff852a2c62591414bcb4150c28a88e4d1463028b5e94baa4ca66a57fa03c9616422ac8f948916171ab10447b63a6c441acd368962"}) [ 490.595383] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 490.601655] b_state=0x00000029, b_size=512 [ 490.605996] device loop0 blocksize: 4096 [ 490.668582] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 490.674986] b_state=0x00000029, b_size=512 [ 490.679240] device loop0 blocksize: 4096 [ 490.715056] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 490.721364] b_state=0x00000029, b_size=512 [ 490.725697] device loop0 blocksize: 4096 21:13:11 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, 0x0) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 490.780881] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 490.787411] b_state=0x00000029, b_size=512 [ 490.791664] device loop0 blocksize: 4096 [ 490.866910] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 490.873156] b_state=0x00000029, b_size=512 [ 490.877556] device loop0 blocksize: 4096 [ 490.881852] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 490.888101] b_state=0x00000029, b_size=512 [ 490.892350] device loop0 blocksize: 4096 [ 490.896719] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 490.902909] b_state=0x00000029, b_size=512 [ 490.907242] device loop0 blocksize: 4096 [ 490.911554] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 490.918047] b_state=0x00000029, b_size=512 [ 490.922284] device loop0 blocksize: 4096 [ 490.935704] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 490.941975] b_state=0x00000029, b_size=512 [ 490.946213] device loop0 blocksize: 4096 [ 490.950362] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 490.956511] b_state=0x00000029, b_size=512 [ 490.960850] device loop0 blocksize: 4096 21:13:12 executing program 4: getgroups(0x2, &(0x7f0000000200)=[0xffffffffffffffff, 0xffffffffffffffff]) getgroups(0x2, &(0x7f0000000240)=[0xee01, 0xee01]) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x100) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000280)=@mangle={'mangle\x00', 0x1f, 0x6, 0x628, 0x0, 0xe8, 0x450, 0x450, 0x348, 0x590, 0x590, 0x590, 0x590, 0x590, 0x6, &(0x7f0000000040), {[{{@ip={@local, @remote, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'syz_tun\x00', {}, {}, 0xff, 0x1, 0x4}, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x7, 0x5}}}, {{@uncond, 0x0, 0x100, 0x160, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x5, [0x0, 0x0, 0x7f, 0x5, 0x10000, 0x80], 0x80, 0xf1b3}}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x5}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast, 0x6, 0x0, [0x17, 0x32, 0x2, 0x1e, 0x26, 0x3f, 0x20, 0x18, 0x18, 0x10, 0xb, 0x28, 0x23, 0x3b, 0xd, 0x10], 0x0, 0x3f, 0x9}}}, {{@uncond, 0x0, 0xc0, 0x100, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x4, 0x1, @ipv4=@rand_addr=0xa470, 0x4e21}}}, {{@uncond, 0x0, 0xe0, 0x108, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x1f, 0x7, 0x80000000}}, @common=@socket0={0x20, 'socket\x00'}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x19}}}, {{@ip={@broadcast, @empty, 0x0, 0xffffff00, 'sit0\x00', 'nr0\x00', {}, {0xff}, 0x0, 0x3, 0x42}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x5, [0xfff, 0xc941, 0x200, 0x100000001, 0x6000000000, 0xdee], 0x401, 0x1}}}, @common=@inet=@length={0x28, 'length\x00', 0x0, {0x2, 0xfffffffffffffffd, 0x1}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x6, 0xffffffffffff0000, @ipv6=@local, 0x4e20}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x688) setregid(r0, r1) [ 490.965870] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 490.972100] b_state=0x00000029, b_size=512 [ 490.976344] device loop0 blocksize: 4096 [ 490.980487] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 490.986630] b_state=0x00000029, b_size=512 [ 490.990920] device loop0 blocksize: 4096 [ 490.995006] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 491.001551] b_state=0x00000029, b_size=512 [ 491.005791] device loop0 blocksize: 4096 [ 491.079305] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 491.085503] b_state=0x00000029, b_size=512 [ 491.089886] device loop0 blocksize: 4096 [ 491.094095] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 491.100336] b_state=0x00000029, b_size=512 [ 491.104573] device loop0 blocksize: 4096 [ 491.108849] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 491.115004] b_state=0x00000029, b_size=512 [ 491.119319] device loop0 blocksize: 4096 [ 491.123534] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 491.130120] b_state=0x00000029, b_size=512 [ 491.134368] device loop0 blocksize: 4096 [ 491.142101] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 491.148328] b_state=0x00000029, b_size=512 [ 491.152647] device loop0 blocksize: 4096 [ 491.156809] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 491.163080] b_state=0x00000029, b_size=512 [ 491.167329] device loop0 blocksize: 4096 [ 491.174999] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 491.181282] b_state=0x00000029, b_size=512 [ 491.185522] device loop0 blocksize: 4096 [ 491.192373] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 491.198702] b_state=0x00000029, b_size=512 [ 491.203005] device loop0 blocksize: 4096 [ 491.217506] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 491.224073] b_state=0x00000029, b_size=512 [ 491.228321] device loop0 blocksize: 4096 [ 491.233314] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 491.239578] b_state=0x00000029, b_size=512 [ 491.243819] device loop0 blocksize: 4096 [ 491.247888] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 491.254166] b_state=0x00000029, b_size=512 [ 491.258399] device loop0 blocksize: 4096 [ 491.262522] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 491.268662] b_state=0x00000029, b_size=512 [ 491.273203] device loop0 blocksize: 4096 [ 491.285965] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 491.292199] b_state=0x00000029, b_size=512 [ 491.292208] device loop0 blocksize: 4096 [ 491.292233] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 491.306742] b_state=0x00000029, b_size=512 [ 491.311006] device loop0 blocksize: 4096 [ 491.330118] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 491.336296] b_state=0x00000029, b_size=512 [ 491.340612] device loop0 blocksize: 4096 [ 491.347078] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 491.353528] b_state=0x00000029, b_size=512 [ 491.357770] device loop0 blocksize: 4096 [ 491.366736] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 491.373514] b_state=0x00000029, b_size=512 [ 491.377749] device loop0 blocksize: 4096 21:13:12 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00\x00\x00\x00\x88\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 491.381946] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 491.388096] b_state=0x00000029, b_size=512 [ 491.392430] device loop0 blocksize: 4096 [ 491.396511] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 491.403901] b_state=0x00000029, b_size=512 [ 491.408152] device loop0 blocksize: 4096 [ 491.424153] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 491.430464] b_state=0x00000029, b_size=512 [ 491.434763] device loop0 blocksize: 4096 [ 491.438902] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 491.445117] b_state=0x00000029, b_size=512 [ 491.449352] device loop0 blocksize: 4096 [ 491.453536] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 491.459724] b_state=0x00000029, b_size=512 [ 491.464003] device loop0 blocksize: 4096 [ 491.468150] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 491.474383] b_state=0x00000029, b_size=512 [ 491.478627] device loop0 blocksize: 4096 [ 491.482931] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 491.489124] b_state=0x00000029, b_size=512 [ 491.493625] device loop0 blocksize: 4096 [ 491.497859] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 491.504123] b_state=0x00000029, b_size=512 [ 491.508367] device loop0 blocksize: 4096 [ 491.518211] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 491.524580] b_state=0x00000029, b_size=512 [ 491.528819] device loop0 blocksize: 4096 [ 491.547734] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 491.554245] b_state=0x00000029, b_size=512 [ 491.558481] device loop0 blocksize: 4096 [ 491.564772] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 491.571020] b_state=0x00000029, b_size=512 [ 491.575481] device loop0 blocksize: 4096 21:13:12 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_setup(0x8, &(0x7f0000000040)=0x0) io_destroy(r2) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000000c0)=""/206) [ 491.666228] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 491.672414] b_state=0x00000029, b_size=512 [ 491.676730] device loop0 blocksize: 4096 21:13:12 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x2, 0x0) socket$inet6(0xa, 0x800005, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x7fffffff) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000000)={0x1, 0x101}) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-vsock\x00', 0x2, 0x0) readlinkat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/2, 0x2) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000140)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) socket$inet6(0xa, 0x3, 0x5) write$cgroup_subtree(r3, &(0x7f00000001c0)={[{0x2b, 'io'}, {0x2b, 'memory'}, {0x2d, 'io'}, {0x2b, 'cpu'}]}, 0x15) 21:13:12 executing program 0: r0 = socket$inet6(0xa, 0xe, 0x400) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2008000) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xc, 0x80000001, 0x7, 0x80000, 0xffffffffffffff9c}) socket$inet6(0xa, 0x1, 0x4c88) ioctl$UFFDIO_ZEROPAGE(r2, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}, 0x1}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000040)={0x60000009}) sendfile(r0, r2, 0x0, 0x800000000031) 21:13:12 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2008000) sendfile(r0, r1, 0x0, 0x800000000031) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x0, @local, 'rose0\x00'}}) [ 491.830073] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 491.836432] b_state=0x00000029, b_size=512 [ 491.840673] device loop0 blocksize: 4096 [ 491.872989] Unknown ioctl 1074310932 [ 491.891513] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 491.897980] b_state=0x00000029, b_size=512 [ 491.902225] device loop0 blocksize: 4096 [ 491.940213] Unknown ioctl 1074310932 21:13:13 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 491.971761] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 491.978061] b_state=0x00000029, b_size=512 [ 491.982302] device loop0 blocksize: 4096 [ 491.998008] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 492.004266] b_state=0x00000029, b_size=512 [ 492.008615] device loop0 blocksize: 4096 [ 492.014507] __find_get_block_slow() failed. block=1, b_blocknr=8 21:13:13 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x3, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f00000001c0)=0xa977, 0x8) close(r0) ioctl$VIDIOC_S_INPUT(r1, 0xc0045627, &(0x7f0000000240)=0x5) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x1ffe) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2008000) sendfile(r0, r3, 0x0, 0x800000000031) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e20, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}}, 0x5, 0xdc, 0x9, 0x10100000, 0x8}, &(0x7f0000000000)=0x98) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000200)={0x0, r3}) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000040)={r4, 0x7ff}, 0x8) 21:13:13 executing program 1: write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f00000001c0)={0x14, 0x11, 0x0, {0x0, 0x3}}, 0x14) socket$key(0xf, 0x3, 0x2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r0, 0x2, 0x1) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x20, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000280)={0x7, 0xc0010044, &(0x7f0000000300), 0x0}) r1 = accept4$rose(0xffffffffffffff9c, &(0x7f0000000200)=@full={0xb, @dev, @null, 0x0, [@rose, @bcast, @remote, @null, @bcast]}, &(0x7f0000000240)=0x40, 0x80000) getsockopt$rose(r1, 0x104, 0x3, &(0x7f0000000300), &(0x7f0000000340)=0x4) syz_open_pts(0xffffffffffffffff, 0x0) syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) 21:13:13 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f0000222000)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback, 0x3}, 0x1c) syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffb, 0x200) pipe(&(0x7f0000000080)={0xffffffffffffffff}) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x0, 0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000b7ff8)={0x0, 0x269}, &(0x7f0000000000)=0xa80) [ 492.020911] b_state=0x00000029, b_size=512 [ 492.025156] device loop0 blocksize: 4096 [ 492.048940] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 492.055220] b_state=0x00000029, b_size=512 [ 492.059567] device loop0 blocksize: 4096 [ 492.139291] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 492.146233] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 492.152563] b_state=0x00000029, b_size=512 [ 492.156812] device loop0 blocksize: 4096 [ 492.161119] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 492.167328] b_state=0x00000029, b_size=512 [ 492.171611] device loop0 blocksize: 4096 [ 492.175685] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 492.182182] b_state=0x00000029, b_size=512 [ 492.186418] device loop0 blocksize: 4096 21:13:13 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 492.347985] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 492.354479] b_state=0x00000029, b_size=512 [ 492.358770] device loop0 blocksize: 4096 21:13:13 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 492.436148] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 492.442417] b_state=0x00000029, b_size=512 [ 492.446657] device loop0 blocksize: 4096 [ 492.471577] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 492.477960] b_state=0x00000029, b_size=512 [ 492.482315] device loop0 blocksize: 4096 21:13:13 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 492.655022] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 492.661309] b_state=0x00000029, b_size=512 [ 492.665547] device loop0 blocksize: 4096 [ 492.722860] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 492.729104] b_state=0x00000029, b_size=512 [ 492.733438] device loop0 blocksize: 4096 21:13:13 executing program 4: io_setup(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x402d, 0x8200) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in=@multicast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, @in6=@local, 0x4e24, 0x5, 0x4e20, 0xffffffffffffff7d, 0x2, 0x80, 0x20, 0x7f, r2, r3}, {0x7fffffff, 0x8, 0x0, 0x9, 0x400, 0x7, 0x7f, 0x4}, {0x98, 0x100000000, 0x6, 0x89fc}, 0x4, 0x6e6bc0, 0x2, 0x1, 0x1}, {{@in6=@dev={0xfe, 0x80, [], 0x21}, 0x4d2}, 0x2, @in=@rand_addr=0xecfd, 0x3500, 0x2, 0x0, 0xfffffffffffffffc, 0x0, 0x10000, 0x336}}, 0xe8) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000c40)={0x20, 0x3, 0x1, 0x1, 0x0, 0x0, {}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) [ 492.774390] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 492.780583] b_state=0x00000029, b_size=512 [ 492.785199] device loop0 blocksize: 4096 [ 492.858437] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 492.864745] b_state=0x00000029, b_size=512 [ 492.868984] device loop0 blocksize: 4096 [ 492.874594] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 492.880901] b_state=0x00000029, b_size=512 [ 492.885255] device loop0 blocksize: 4096 21:13:14 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) fadvise64(r0, 0x0, 0x20, 0x2) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000000000)='./bus\x00', 0x200513cc0, 0x0) ftruncate(r1, 0x2008000) sendfile(r0, r1, 0x0, 0x800000000031) [ 492.932950] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 492.939306] b_state=0x00000029, b_size=512 [ 492.943625] device loop0 blocksize: 4096 21:13:14 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:14 executing program 4: prctl$PR_GET_NO_NEW_PRIVS(0x27) syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(r2, 0x4080aea1, &(0x7f0000000380)=""/4096) timerfd_create(0x5, 0x80800) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0)={0x64}, &(0x7f0000000100), &(0x7f0000000140)={0x8}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) memfd_create(0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) [ 492.988765] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 492.995080] b_state=0x00000029, b_size=512 [ 492.999335] device loop0 blocksize: 4096 [ 493.011779] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 493.018331] b_state=0x00000029, b_size=512 [ 493.022574] device loop0 blocksize: 4096 21:13:14 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0x0, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 493.114541] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 493.120850] b_state=0x00000029, b_size=512 [ 493.125162] device loop0 blocksize: 4096 [ 493.139014] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 493.145496] b_state=0x00000029, b_size=512 [ 493.149738] device loop0 blocksize: 4096 21:13:14 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) setsockopt$inet6_tcp_buf(r1, 0x6, 0x0, &(0x7f0000000000)="8fcb18ba91b2b1c00fd8c654bd", 0xd) sendfile(r0, r2, 0x0, 0x800000000031) 21:13:14 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x3}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000200)={0x0, 0xef, 0x6, 0x4, 0x3, 0x80000001, 0x8, 0x40, {r3, @in={{0x2, 0x4e23, @multicast2}}, 0x1, 0x100000001, 0x7f, 0x401, 0x7}}, &(0x7f00000002c0)=0xb0) fcntl$lock(r1, 0x7, &(0x7f0000002000)={0x1}) unshare(0x400) fcntl$lock(r1, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0xffffffffffffffff}) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) dup3(r0, r1, 0x0) [ 493.207456] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 493.213865] b_state=0x00000029, b_size=512 [ 493.218325] device loop0 blocksize: 4096 21:13:14 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x440000, 0x0) ftruncate(r0, 0x101) r1 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f00000001c0)={0x4, &(0x7f00000000c0)=[{0x2, 0x80}, {0xfff, 0x3}, {0x5, 0x1ff}, {0x1, 0x401}]}) close(r1) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x14103e, 0x0) ftruncate(r2, 0x2008000) sendfile(r1, r2, 0x0, 0x800000000031) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0xffffffffffffff2e, r3, 0x700, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x20}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x80) ioctl$RTC_UIE_OFF(r2, 0x7004) [ 493.261898] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 493.268415] b_state=0x00000029, b_size=512 [ 493.272671] device loop0 blocksize: 4096 [ 493.347933] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 493.354135] b_state=0x00000029, b_size=512 [ 493.358473] device loop0 blocksize: 4096 [ 493.411033] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 493.417298] b_state=0x00000029, b_size=512 [ 493.421776] device loop0 blocksize: 4096 21:13:14 executing program 2: close(0xffffffffffffffff) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x4) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2008000) sendfile(0xffffffffffffffff, r0, 0x0, 0x800000000031) [ 493.457151] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 493.463439] b_state=0x00000029, b_size=512 [ 493.467680] device loop0 blocksize: 4096 21:13:14 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00\x00\x00\x00\x00\x00\x00\x00\x11', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:14 executing program 1: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0xfffffffffffffffc) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x8}) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40106437, &(0x7f0000000040)={r3, 0x3}) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) [ 493.518294] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 493.524489] b_state=0x00000029, b_size=512 [ 493.528983] device loop0 blocksize: 4096 [ 493.557705] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 493.563966] b_state=0x00000029, b_size=512 21:13:14 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x0, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 493.568203] device loop0 blocksize: 4096 21:13:14 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x2) ftruncate(r1, 0x100002007ffd) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x8001, {0x9, 0xfffffffeffffffff, 0xb23a, 0x25, 0x7, 0x5}, 0x5, 0x8}, 0xe) sendfile(r0, r2, 0x0, 0x800000000031) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e24, @empty}}, 0xfffffffffffffffb, 0x3000000000000}, &(0x7f0000000100)=0x90) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f0000000240)={0x8, 0x10000, 0x7fff, 0x3, 0x1ff, 0x9}) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000180)={r3, 0x1c, &(0x7f0000000140)=[@in6={0xa, 0x4e21, 0x4, @empty, 0xffffffff}]}, &(0x7f00000001c0)=0x10) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e4) [ 493.627416] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 493.633894] b_state=0x00000029, b_size=512 [ 493.638145] device loop0 blocksize: 4096 [ 493.658072] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 493.664370] b_state=0x00000029, b_size=512 [ 493.668618] device loop0 blocksize: 4096 [ 493.713194] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 493.719416] b_state=0x00000029, b_size=512 [ 493.723732] device loop0 blocksize: 4096 [ 493.746037] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 493.752431] b_state=0x00000029, b_size=512 [ 493.756670] device loop0 blocksize: 4096 [ 493.785044] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 493.791370] b_state=0x00000029, b_size=512 [ 493.795607] device loop0 blocksize: 4096 [ 493.807861] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 493.814138] b_state=0x00000029, b_size=512 [ 493.818395] device loop0 blocksize: 4096 21:13:14 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)=0x5, 0x4) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r3 = openat(r2, &(0x7f0000000000)='./bus\x00', 0x0, 0x10) ftruncate(r2, 0x2008000) bind$inet6(r3, &(0x7f00000003c0)={0xa, 0x4e21, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8}, 0x1c) sendfile(r0, r2, 0x0, 0x800000000031) sendmsg$inet_sctp(r1, &(0x7f0000000380)={&(0x7f00000000c0)=@in={0x2, 0x4e21, @local}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000100)="8e9cc148606107b99857d2337f9ae6e52ed6b089e28c59d8901697e5968d004d4ccee3e2730595e51e567ac00fb784635668d98bd309a378ed41ffcf4c3ea155584f4fa1c2e24962be59439fc11d49d9795df49401f8ed61efa1d1b2b4860db03c21ac58f75f7cdd36639df933fe0402586218ded17363e3ffd6bcc02cc369c728848ad920a65751848c8cb77aca75b0149508774c1d94ee33e7202569f40daf711301c707b64125f95ac88788261fac3c86fc79", 0xb4}, {&(0x7f0000000240)="54e6885e3741d0d48c82ac7d2a94016fa7dbb25f164f8168f7fea4e0fdaed08bcbf43d67b7ed93faf468e01af4a2140eb9ce3321ee018ef47dcb8606cafea97426560defda7058bd3f440e65e2ff4a22a7cce5824038ff9162ab1ee227895d6ea8e3b4d4c82469de10c68fc0c2e90224a678602f0705", 0x76}, {&(0x7f00000002c0)="61fac50d7f462a3d3889bfed47494bededc62a4446621383b0da82dca69ac381ea2b0517dd12b78a74ffa8461c29271a1cfde42fe7fdd06b072d1f0a8730bfc5898ebb", 0x43}], 0x3, &(0x7f0000000340)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast1}], 0x18}, 0x4) [ 493.843552] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 493.849803] b_state=0x00000029, b_size=512 [ 493.854203] device loop0 blocksize: 4096 [ 493.880902] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 493.887193] b_state=0x00000029, b_size=512 [ 493.891516] device loop0 blocksize: 4096 21:13:15 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x401, 0x2001) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0xfffffffffffffffc) sendfile(r0, r1, 0x0, 0x800000000031) [ 493.932202] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 493.938437] b_state=0x00000029, b_size=512 [ 493.942895] device loop0 blocksize: 4096 [ 493.985700] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 493.991961] b_state=0x00000029, b_size=512 [ 493.996304] device loop0 blocksize: 4096 [ 494.035147] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 494.041369] b_state=0x00000029, b_size=512 [ 494.045683] device loop0 blocksize: 4096 [ 494.070123] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 494.076723] b_state=0x00000029, b_size=512 [ 494.080966] device loop0 blocksize: 4096 [ 494.087158] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 494.093592] b_state=0x00000029, b_size=512 [ 494.097860] device loop0 blocksize: 4096 [ 494.105381] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 494.111780] b_state=0x00000029, b_size=512 [ 494.116150] device loop0 blocksize: 4096 [ 494.153631] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 494.159826] b_state=0x00000029, b_size=512 [ 494.164338] device loop0 blocksize: 4096 [ 494.173491] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 494.179916] b_state=0x00000029, b_size=512 [ 494.184221] device loop0 blocksize: 4096 [ 494.188567] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 494.195088] b_state=0x00000029, b_size=512 [ 494.199340] device loop0 blocksize: 4096 [ 494.217558] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 494.223774] b_state=0x00000029, b_size=512 [ 494.228087] device loop0 blocksize: 4096 [ 494.232246] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 494.238636] b_state=0x00000029, b_size=512 [ 494.242873] device loop0 blocksize: 4096 [ 494.252277] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 494.258575] b_state=0x00000029, b_size=512 [ 494.262808] device loop0 blocksize: 4096 [ 494.267152] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 494.273403] b_state=0x00000029, b_size=512 [ 494.277856] device loop0 blocksize: 4096 [ 494.282206] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 494.288659] b_state=0x00000029, b_size=512 [ 494.292898] device loop0 blocksize: 4096 [ 494.429163] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 494.435361] b_state=0x00000029, b_size=512 [ 494.439836] device loop0 blocksize: 4096 [ 494.490557] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 494.496971] b_state=0x00000029, b_size=512 [ 494.501217] device loop0 blocksize: 4096 [ 494.509777] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 494.515941] b_state=0x00000029, b_size=512 [ 494.520306] device loop0 blocksize: 4096 [ 494.524391] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 494.530604] b_state=0x00000029, b_size=512 [ 494.534836] device loop0 blocksize: 4096 [ 494.538989] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 494.545148] b_state=0x00000029, b_size=512 [ 494.549509] device loop0 blocksize: 4096 [ 494.553675] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 494.559982] b_state=0x00000029, b_size=512 [ 494.564218] device loop0 blocksize: 4096 [ 494.568358] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 494.574503] b_state=0x00000029, b_size=512 [ 494.578965] device loop0 blocksize: 4096 [ 494.583312] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 494.589536] b_state=0x00000029, b_size=512 [ 494.593772] device loop0 blocksize: 4096 [ 494.597952] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 494.604103] b_state=0x00000029, b_size=512 [ 494.608469] device loop0 blocksize: 4096 [ 494.618401] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 494.624638] b_state=0x00000029, b_size=512 [ 494.628954] device loop0 blocksize: 4096 [ 494.633042] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 494.639414] b_state=0x00000029, b_size=512 [ 494.643653] device loop0 blocksize: 4096 [ 494.659411] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 494.665585] b_state=0x00000029, b_size=512 [ 494.669911] device loop0 blocksize: 4096 [ 494.673989] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 494.680230] b_state=0x00000029, b_size=512 [ 494.684467] device loop0 blocksize: 4096 [ 494.688585] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 494.694730] b_state=0x00000029, b_size=512 [ 494.699019] device loop0 blocksize: 4096 [ 494.703094] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 494.709309] b_state=0x00000029, b_size=512 [ 494.713546] device loop0 blocksize: 4096 [ 494.717728] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 494.724105] b_state=0x00000029, b_size=512 [ 494.728513] device loop0 blocksize: 4096 [ 494.789598] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 494.795802] b_state=0x00000029, b_size=512 [ 494.800230] device loop0 blocksize: 4096 21:13:15 executing program 4: pkey_free(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000300)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x200000000007fffe, 0x0) r3 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000500)={{0x0, 0x2, 0x24, 0x46, '\x00', 0x3}, 0x0, 0x20000160, 0x9, r3, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000940)=0xffffffffffffffc9) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r5 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r5, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f00000004c0)={@remote}, &(0x7f0000000200)=0xffffffffffffff9f) r6 = dup2(r1, r1) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000001c0)={r4, @loopback, @rand_addr=0x1cb}, 0x151) syz_open_procfs(0x0, &(0x7f0000000240)='net/sco\x00') connect$inet6(r6, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @empty, 0x2d1}, 0x1c) r7 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) bind$can_raw(r7, &(0x7f0000001640)={0x1d, r8}, 0x10) setsockopt(r7, 0x65, 0x0, &(0x7f0000000040)="92a88ed40ca365e96b138d573ae703afe0680a8d7ef762f39fd5f790ffffffdf137dc737f5953735c9e86297d2a3cbc679e5a12ea1e14a8b68f6cdcd62e119311b04ba5e0effc1dd46fbba8099ea73aa23f5de9a0523e61fafb03fe7682d9ce61c0450032e369ce18a7ea3bd10e75a4efdecd23143c9bd8d", 0x78) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0x40800000000009) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000440)=""/62) keyctl$assume_authority(0x10, 0x0) r9 = syz_open_dev$ndb(&(0x7f0000000140)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0)) close(r9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 494.870192] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 494.876385] b_state=0x00000029, b_size=512 [ 494.880713] device loop0 blocksize: 4096 [ 494.897748] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 494.904023] b_state=0x00000029, b_size=512 [ 494.908263] device loop0 blocksize: 4096 21:13:15 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00\x00\x00\x00\x00\x00\x11\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="0749323abe4387662d10b7cd76fa130304000000000000c3c7ca160a7b5d2d82068cfdbb81a6fbf8c375677ecbc21685bc57675b607ac350289ac120719ff229bf6da4e191bcee0837dfcaac0518917528ba1d590f46b5240322c1f97f5c4d8903d2dc0096c5bef6b74708000000cee3d90f6aeb04fa55ff1c31d57645f77192b91cdc62428ab2742c28c1f44b81c71e1041fe412e2568ec39b7bf23bc2bc6568121b0bccf91b3c021816f242e3363a32511b78693f810a75ff82452b3f05889945d412d6ab8d78342575ee059a44b0df78589a0d3d84206481b05d31a0b973f091b08aa4adb561b5c54dcd8cf27e71d58a007a3b2124db2fbf1fcfc1ad861d18691d5a45b2538e8bb8c222996a29fd8f0736e446608ad03d2ba05579c93370b5ccff3d63b3cf3f2cfdb4472be1e7d4a6438746f9862e0e31656f65f9c3f378d4223029e18b18ba886f171cba9bd226ecd8effd793cca2458600f093fa20eeed1a05f54006656856445ae6800c9b9b"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:15 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x0, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:15 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2008000) accept$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4}, &(0x7f0000000040)=0x1c) sendfile(r0, r2, 0x0, 0x800000000031) 21:13:15 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="020300020a0000000000000000000000030006000000000002000000e000000100000002000000000000000000000000000003000500000000000200000000518c00"], 0x50}}, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x10000, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f00000000c0)=0xe) [ 494.926167] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 494.932468] b_state=0x00000029, b_size=512 [ 494.936709] device loop0 blocksize: 4096 21:13:16 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) fcntl$dupfd(r0, 0x406, r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_read_part_table(0x81, 0x5, &(0x7f00000014c0)=[{&(0x7f0000000340)="12fd3c4ba349f1fc5e4dc2b890dae9486ca96e551630efb1c9c8dcb4a0fa64c72044e9adaea14e521dab746678e4cb4fe2473228e1030e55f0cc86c6bc40d561829f13b698887d0b946c702f5880003810818e94e9234098985d8147c03e", 0x5e, 0x6}, {&(0x7f00000003c0)="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", 0x1000, 0x8}, {&(0x7f00000013c0)="9a02c51bc72d644d6a776df4c5021f6dbdd79df40656a14c36054e71609dc2774232ea7b65b7a9652b92eb0421b8b791ee94e08a1f4151fb4d205a70f7b41492d58529c932c0fd77d56f5cfa28feac57214901e2d8dd8cb5c7b9c43b2e1767efb01d044508cffeb798837c65e9c31a3a82bd2fe1d0b68854e6fddca2eec48572016ac14f71a5d3cbdd12b4d99fcb0c8ec3cc154b8eaa9c34757a96f2f45a0b5de76a6827c56382e7a08a304a5a141eb0195341", 0xb3, 0xfffffffffffffff8}, {&(0x7f0000001480)="b3918a939bb7f6c96f5077d52816ec4808cfa52141d09c62146bce7c85a429aa", 0x20, 0x25b457db}, {&(0x7f0000002040)="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", 0x1000, 0x1}]) ftruncate(r2, 0x2008000) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@ipv4={[], [], @multicast2}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@initdev}}, &(0x7f00000001c0)=0xe8) sendfile(r0, r2, 0x0, 0x800000000034) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000000)={0x28, 0x2, 0x0, {0x6, 0x8000, 0x2}}, 0x28) openat$ppp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ppp\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000280)={'icmp6\x00'}, &(0x7f00000002c0)=0x1e) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f0000000040)={'icmp6\x00'}, &(0x7f0000000080)=0x1e) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000240)={@remote, r3}, 0x14) [ 495.032562] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 495.038809] b_state=0x00000029, b_size=512 [ 495.043160] device loop0 blocksize: 4096 [ 495.065385] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 495.071767] b_state=0x00000029, b_size=512 [ 495.076010] device loop0 blocksize: 4096 [ 495.089427] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 495.095796] b_state=0x00000029, b_size=512 [ 495.100035] device loop0 blocksize: 4096 [ 495.155380] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 495.161638] b_state=0x00000029, b_size=512 [ 495.166018] device loop0 blocksize: 4096 [ 495.170247] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 495.176532] b_state=0x00000029, b_size=512 [ 495.180771] device loop0 blocksize: 4096 [ 495.185074] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 495.192211] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 495.198439] b_state=0x00000029, b_size=512 [ 495.202862] device loop0 blocksize: 4096 [ 495.238907] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 495.245260] b_state=0x00000029, b_size=512 [ 495.249496] device loop0 blocksize: 4096 21:13:16 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) ioctl$int_in(r0, 0x5421, &(0x7f0000000380)) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x11a) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0), 0xfffffffffffffd2e) [ 495.282759] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 495.289231] b_state=0x00000029, b_size=512 [ 495.293530] device loop0 blocksize: 4096 [ 495.357715] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 495.364228] b_state=0x00000029, b_size=512 [ 495.368468] device loop0 blocksize: 4096 [ 495.373020] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 495.379243] b_state=0x00000029, b_size=512 [ 495.383475] device loop0 blocksize: 4096 [ 495.387614] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 495.393831] b_state=0x00000029, b_size=512 [ 495.398063] device loop0 blocksize: 4096 [ 495.402149] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 495.408406] b_state=0x00000029, b_size=512 [ 495.412640] device loop0 blocksize: 4096 [ 495.430432] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 495.436797] b_state=0x00000029, b_size=512 [ 495.441040] device loop0 blocksize: 4096 [ 495.445382] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 495.451533] b_state=0x00000029, b_size=512 [ 495.455953] device loop0 blocksize: 4096 [ 495.460188] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 495.466402] b_state=0x00000029, b_size=512 [ 495.470646] device loop0 blocksize: 4096 [ 495.474941] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 495.481088] b_state=0x00000029, b_size=512 [ 495.485394] device loop0 blocksize: 4096 [ 495.489591] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 495.496062] b_state=0x00000029, b_size=512 [ 495.500299] device loop0 blocksize: 4096 [ 495.518927] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 495.525240] b_state=0x00000029, b_size=512 [ 495.529480] device loop0 blocksize: 4096 [ 495.542017] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 495.548317] b_state=0x00000029, b_size=512 [ 495.552554] device loop0 blocksize: 4096 [ 495.580686] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 495.587071] b_state=0x00000029, b_size=512 [ 495.591321] device loop0 blocksize: 4096 [ 495.595537] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 495.601684] b_state=0x00000029, b_size=512 [ 495.605966] device loop0 blocksize: 4096 [ 495.612394] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 495.618715] b_state=0x00000029, b_size=512 [ 495.622957] device loop0 blocksize: 4096 [ 495.629547] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 495.635872] b_state=0x00000029, b_size=512 [ 495.640126] device loop0 blocksize: 4096 [ 495.665281] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 495.671585] b_state=0x00000029, b_size=512 [ 495.675828] device loop0 blocksize: 4096 21:13:16 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x0, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="0749323abe4387662d10b7cd76fa130304000000000000c3c7ca160a7b5d2d82068cfdbb81a6fbf8c375677ecbc21685bc57675b607ac350289ac120719ff229bf6da4e191bcee0837dfcaac0518917528ba1d590f46b5240322c1f97f5c4d8903d2dc0096c5bef6b74708000000cee3d90f6aeb04fa55ff1c31d57645f77192b91cdc62428ab2742c28c1f44b81c71e1041fe412e2568ec39b7bf23bc2bc6568121b0bccf91b3c021816f242e3363a32511b78693f810a75ff82452b3f05889945d412d6ab8d78342575ee059a44b0df78589a0d3d84206481b05d31a0b973f091b08aa4adb561b5c54dcd8cf27e71d58a007a3b2124db2fbf1fcfc1ad861d18691d5a45b2538e8bb8c222996a29fd8f0736e446608ad03d2ba05579c93370b5ccff3d63b3cf3f2cfdb4472be1e7d4a6438746f9862e0e31656f65f9c3f378d4223029e18b18ba886f171cba9bd226ecd8effd793cca2458600f093fa20eeed1a05f54006656856445ae6800c9b9b"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 495.752406] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 495.759004] b_state=0x00000029, b_size=512 [ 495.763246] device loop0 blocksize: 4096 [ 495.767509] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 495.773673] b_state=0x00000029, b_size=512 [ 495.777971] device loop0 blocksize: 4096 [ 495.782179] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 495.788604] b_state=0x00000029, b_size=512 [ 495.792852] device loop0 blocksize: 4096 21:13:16 executing program 4: pkey_free(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000300)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x200000000007fffe, 0x0) r3 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000500)={{0x0, 0x2, 0x24, 0x46, '\x00', 0x3}, 0x0, 0x20000160, 0x9, r3, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000940)=0xffffffffffffffc9) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r5 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r5, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f00000004c0)={@remote}, &(0x7f0000000200)=0xffffffffffffff9f) r6 = dup2(r1, r1) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000001c0)={r4, @loopback, @rand_addr=0x1cb}, 0x151) syz_open_procfs(0x0, &(0x7f0000000240)='net/sco\x00') connect$inet6(r6, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @empty, 0x2d1}, 0x1c) r7 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) bind$can_raw(r7, &(0x7f0000001640)={0x1d, r8}, 0x10) setsockopt(r7, 0x65, 0x0, &(0x7f0000000040)="92a88ed40ca365e96b138d573ae703afe0680a8d7ef762f39fd5f790ffffffdf137dc737f5953735c9e86297d2a3cbc679e5a12ea1e14a8b68f6cdcd62e119311b04ba5e0effc1dd46fbba8099ea73aa23f5de9a0523e61fafb03fe7682d9ce61c0450032e369ce18a7ea3bd10e75a4efdecd23143c9bd8d", 0x78) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0x40800000000009) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000440)=""/62) keyctl$assume_authority(0x10, 0x0) r9 = syz_open_dev$ndb(&(0x7f0000000140)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0)) close(r9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:13:16 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000367fe4)=""/91, 0xfffffe63) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000000000011, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) mmap(&(0x7f000094f000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0x100000073) read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r5 = creat(&(0x7f0000000100)='./file0\x00', 0x80) write$P9_RREADDIR(r5, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x87) ioctl$KVM_CHECK_EXTENSION(r4, 0xae03, 0xa8ae) [ 495.818637] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 495.824829] b_state=0x00000029, b_size=512 [ 495.829193] device loop0 blocksize: 4096 [ 495.834101] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 495.840475] b_state=0x00000029, b_size=512 [ 495.844711] device loop0 blocksize: 4096 [ 495.852701] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 495.859306] b_state=0x00000029, b_size=512 [ 495.863567] device loop0 blocksize: 4096 21:13:16 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00\x00\x00\x00\x00\x11\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 495.918400] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 495.924678] b_state=0x00000029, b_size=512 [ 495.929121] device loop0 blocksize: 4096 [ 496.055341] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 496.061838] b_state=0x00000029, b_size=512 [ 496.066080] device loop0 blocksize: 4096 21:13:17 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x200000, 0x0) flistxattr(r0, &(0x7f00000000c0)=""/90, 0x5a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$VHOST_RESET_OWNER(r2, 0xaf02, 0x0) ftruncate(r1, 0x80000001) sendfile(r1, r3, 0x0, 0x800000000031) 21:13:17 executing program 4: pkey_free(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000300)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x200000000007fffe, 0x0) r3 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000500)={{0x0, 0x2, 0x24, 0x46, '\x00', 0x3}, 0x0, 0x20000160, 0x9, r3, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000940)=0xffffffffffffffc9) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r5 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r5, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00bc0800000000000000c91df0a42f7a085d878df3e85a0f0699b9cb9e1d24f45265499347e31612e80a971035903c7bfe94000000f34669e42c8bf518a55c923bd83428b19f06fa0ad3744822b7dca780aef5a887977f991dc24ab0e2775d2e1091589500021c1ea4870900000000000000eb4b24a052f2cfa267e45f5731f96ebde59df0b87f32257b8c5c19482ccbab1d0760201efd890e96e8eb1cc5fc4b0c8f91920e60df120cf09ee0b42fd5ba9dbd1716ea577c5374b8cd84636c468988df22619e2c2a30002c00c5032f9e247c8d946406fc4570d991920000a1991207ea4c5d6723b210f2f8ecbf4f2b1300196fb0a6e2be719b96db91d27b102939b5ff4e162ffb95b022821a1e8ddbcd8f3622c23160cb26c529eaee6e581a7c22e29824b2b7daebb96917d8496626d0eecd80cbeb6bbd6a91bcd8ff2e91b8e8db1fda760323c7faa96b0f63a87329b691dc1cc24bf382f871e3dd8fb82754ea3b5c97560e8092ad8cf772f131eb27777410d26fdad5fc81c562370f13e321e99a0a3ecab0167467dd97b331d64682858d0583c2b0de509dd21500a6983d7d63f76224530916"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f00000004c0)={@remote}, &(0x7f0000000200)=0xffffffffffffff9f) r6 = dup2(r1, r1) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000001c0)={r4, @loopback, @rand_addr=0x1cb}, 0x151) syz_open_procfs(0x0, &(0x7f0000000240)='net/sco\x00') connect$inet6(r6, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @empty, 0x2d1}, 0x1c) r7 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) bind$can_raw(r7, &(0x7f0000001640)={0x1d, r8}, 0x10) setsockopt(r7, 0x65, 0x0, &(0x7f0000000040)="92a88ed40ca365e96b138d573ae703afe0680a8d7ef762f39fd5f790ffffffdf137dc737f5953735c9e86297d2a3cbc679e5a12ea1e14a8b68f6cdcd62e119311b04ba5e0effc1dd46fbba8099ea73aa23f5de9a0523e61fafb03fe7682d9ce61c0450032e369ce18a7ea3bd10e75a4efdecd23143c9bd8d", 0x78) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0x40800000000009) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000440)=""/62) keyctl$assume_authority(0x10, 0x0) r9 = syz_open_dev$ndb(&(0x7f0000000140)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0)) close(r9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:13:17 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fcntl$setflags(r2, 0x2, 0x1) ftruncate(r2, 0x2008000) ioctl$TIOCLINUX5(r2, 0x541c, &(0x7f0000000140)={0x5, 0x8, 0x867c, 0x8, 0x9}) sendfile(r0, r2, 0x0, 0x800000000031) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x3f}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000080)={r3, 0xfff}, &(0x7f00000000c0)=0x8) ioctl$VIDIOC_G_CROP(r1, 0xc014563b, &(0x7f0000000100)={0xc, {0xfffffffffffffff8, 0x8, 0x8, 0x7}}) [ 496.306401] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 496.312987] b_state=0x00000029, b_size=512 [ 496.317235] device loop0 blocksize: 4096 [ 496.354229] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 496.360497] b_state=0x00000029, b_size=512 [ 496.364854] device loop0 blocksize: 4096 [ 496.416465] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 496.422772] b_state=0x00000029, b_size=512 [ 496.427035] device loop0 blocksize: 4096 [ 496.454090] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 496.460336] b_state=0x00000029, b_size=512 [ 496.464670] device loop0 blocksize: 4096 [ 496.505278] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 496.511531] b_state=0x00000029, b_size=512 [ 496.516036] device loop0 blocksize: 4096 [ 496.553482] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 496.559710] b_state=0x00000029, b_size=512 [ 496.564713] device loop0 blocksize: 4096 [ 496.569177] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 496.575546] b_state=0x00000029, b_size=512 [ 496.579785] device loop0 blocksize: 4096 21:13:17 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x0, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:17 executing program 4: pkey_free(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000300)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x200000000007fffe, 0x0) r3 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000500)={{0x0, 0x2, 0x24, 0x46, '\x00', 0x3}, 0x0, 0x20000160, 0x9, r3, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000940)=0xffffffffffffffc9) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r5 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r5, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f00000004c0)={@remote}, &(0x7f0000000200)=0xffffffffffffff9f) r6 = dup2(r1, r1) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000001c0)={r4, @loopback, @rand_addr=0x1cb}, 0x151) syz_open_procfs(0x0, &(0x7f0000000240)='net/sco\x00') connect$inet6(r6, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @empty, 0x2d1}, 0x1c) r7 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) bind$can_raw(r7, &(0x7f0000001640)={0x1d, r8}, 0x10) setsockopt(r7, 0x65, 0x0, &(0x7f0000000040)="92a88ed40ca365e96b138d573ae703afe0680a8d7ef762f39fd5f790ffffffdf137dc737f5953735c9e86297d2a3cbc679e5a12ea1e14a8b68f6cdcd62e119311b04ba5e0effc1dd46fbba8099ea73aa23f5de9a0523e61fafb03fe7682d9ce61c0450032e369ce18a7ea3bd10e75a4efdecd23143c9bd8d", 0x78) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0x40800000000009) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000440)=""/62) keyctl$assume_authority(0x10, 0x0) r9 = syz_open_dev$ndb(&(0x7f0000000140)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0)) close(r9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 496.603429] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 496.610210] b_state=0x00000029, b_size=512 [ 496.614649] device loop0 blocksize: 4096 21:13:17 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$SIOCGETLINKNAME(r1, 0x89e0, &(0x7f0000000000)={0x3, 0x2}) ftruncate(r2, 0x2008000) sendfile(r0, r2, 0x0, 0x800000000031) 21:13:17 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00\x00\x00\x00\x00\x88\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="0749323abe4387662d10b7cd76fa130304000000000000c3c7ca160a7b5d2d82068cfdbb81a6fbf8c375677ecbc21685bc57675b607ac350289ac120719ff229bf6da4e191bcee0837dfcaac0518917528ba1d590f46b5240322c1f97f5c4d8903d2dc0096c5bef6b74708000000cee3d90f6aeb04fa55ff1c31d57645f77192b91cdc62428ab2742c28c1f44b81c71e1041fe412e2568ec39b7bf23bc2bc6568121b0bccf91b3c021816f242e3363a32511b78693f810a75ff82452b3f05889945d412d6ab8d78342575ee059a44b0df78589a0d3d84206481b05d31a0b973f091b08aa4adb561b5c54dcd8cf27e71d58a007a3b2124db2fbf1fcfc1ad861d18691d5a45b2538e8bb8c222996a29fd8f0736e446608ad03d2ba05579c93370b5ccff3d63b3cf3f2cfdb4472be1e7d4a6438746f9862e0e31656f65f9c3f378d4223029e18b18ba886f171cba9bd226ecd8effd793cca2458600f093fa20eeed1a05f54006656856445ae6800c9b9b"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 496.660323] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 496.666685] b_state=0x00000029, b_size=512 [ 496.670925] device loop0 blocksize: 4096 [ 496.723193] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 496.729478] b_state=0x00000029, b_size=512 [ 496.733715] device loop0 blocksize: 4096 [ 496.738013] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 496.744169] b_state=0x00000029, b_size=512 [ 496.748489] device loop0 blocksize: 4096 [ 496.752662] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 496.758950] b_state=0x00000029, b_size=512 [ 496.763186] device loop0 blocksize: 4096 [ 496.839047] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 496.845244] b_state=0x00000029, b_size=512 [ 496.849665] device loop0 blocksize: 4096 [ 496.905350] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 496.911717] b_state=0x00000029, b_size=512 [ 496.915955] device loop0 blocksize: 4096 [ 496.959836] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 496.966021] b_state=0x00000029, b_size=512 [ 496.970342] device loop0 blocksize: 4096 [ 496.970366] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 496.980596] b_state=0x00000029, b_size=512 [ 496.984828] device loop0 blocksize: 4096 [ 496.988962] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 496.995106] b_state=0x00000029, b_size=512 [ 496.999675] device loop0 blocksize: 4096 [ 497.004016] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 497.010263] b_state=0x00000029, b_size=512 [ 497.014503] device loop0 blocksize: 4096 [ 497.033470] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 497.039748] b_state=0x00000029, b_size=512 [ 497.043985] device loop0 blocksize: 4096 [ 497.049151] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 497.055302] b_state=0x00000029, b_size=512 [ 497.059568] device loop0 blocksize: 4096 [ 497.063660] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 497.070152] b_state=0x00000029, b_size=512 [ 497.074389] device loop0 blocksize: 4096 21:13:18 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sched_setscheduler(0x0, 0x5, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x10000a) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) ioctl$TIOCNOTTY(r2, 0x5422) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xd9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r3 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1, 0x800) ioctl$KVM_GET_PIT2(r2, 0x8070ae9f, &(0x7f00000001c0)) ioctl$VIDIOC_SUBDEV_G_CROP(r2, 0xc038563b, &(0x7f0000000140)={0x1, 0x0, {0x8, 0x7, 0x8, 0x3}}) ioctl$VIDIOC_G_FREQUENCY(r3, 0xc02c5638, &(0x7f0000000040)={0xea, 0x5, 0x8}) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 497.185106] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 497.191965] b_state=0x00000029, b_size=512 [ 497.196217] device loop0 blocksize: 4096 21:13:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="010000005fd66194010000800000000000000000000000000000000000000000d8ecc0cc676dff6e1b9607c55839c760ac4c2edabc9266613cab12bbe67c981446d893bf725eb6619b48e5d499cffc9c95"]) 21:13:18 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2008000) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000000)={0x1, 0x8, [@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @empty, @broadcast, @random="f5639513559b", @local, @random="5bd49f54e6c8", @dev={[], 0x1c}, @local]}) sendfile(r0, r1, 0x0, 0x800000000031) [ 497.444749] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 497.451105] b_state=0x00000029, b_size=512 [ 497.455366] device loop0 blocksize: 4096 [ 497.513945] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 497.520157] b_state=0x00000029, b_size=512 [ 497.524521] device loop0 blocksize: 4096 [ 497.562250] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 497.568436] b_state=0x00000029, b_size=512 [ 497.572848] device loop0 blocksize: 4096 [ 497.628021] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 497.634305] b_state=0x00000029, b_size=512 [ 497.638551] device loop0 blocksize: 4096 [ 497.744775] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 497.751016] b_state=0x00000029, b_size=512 [ 497.755465] device loop0 blocksize: 4096 [ 497.767525] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 497.773842] b_state=0x00000029, b_size=512 [ 497.778087] device loop0 blocksize: 4096 [ 497.782366] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 497.788736] b_state=0x00000029, b_size=512 [ 497.792978] device loop0 blocksize: 4096 [ 497.797759] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 497.804178] b_state=0x00000029, b_size=512 [ 497.808429] device loop0 blocksize: 4096 [ 497.815421] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 497.821587] b_state=0x00000029, b_size=512 [ 497.825877] device loop0 blocksize: 4096 [ 497.830353] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 497.836744] b_state=0x00000029, b_size=512 [ 497.840994] device loop0 blocksize: 4096 [ 497.846763] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 497.852971] b_state=0x00000029, b_size=512 [ 497.857298] device loop0 blocksize: 4096 [ 497.861602] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 497.867953] b_state=0x00000029, b_size=512 [ 497.872202] device loop0 blocksize: 4096 [ 497.876564] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 497.882762] b_state=0x00000029, b_size=512 [ 497.887106] device loop0 blocksize: 4096 [ 497.891391] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 497.897764] b_state=0x00000029, b_size=512 [ 497.902010] device loop0 blocksize: 4096 [ 497.973453] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 497.979778] b_state=0x00000029, b_size=512 [ 497.984028] device loop0 blocksize: 4096 [ 498.001565] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 498.007831] b_state=0x00000029, b_size=512 [ 498.012075] device loop0 blocksize: 4096 [ 498.016265] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 498.022421] b_state=0x00000029, b_size=512 [ 498.026741] device loop0 blocksize: 4096 [ 498.030830] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 498.037217] b_state=0x00000029, b_size=512 [ 498.041463] device loop0 blocksize: 4096 [ 498.121037] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 498.127450] b_state=0x00000029, b_size=512 [ 498.131701] device loop0 blocksize: 4096 [ 498.205981] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 498.212277] b_state=0x00000029, b_size=512 [ 498.216527] device loop0 blocksize: 4096 [ 498.220725] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 498.226878] b_state=0x00000029, b_size=512 [ 498.231206] device loop0 blocksize: 4096 [ 498.235289] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 498.242283] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 498.248607] b_state=0x00000029, b_size=512 [ 498.252850] device loop0 blocksize: 4096 [ 498.262976] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 498.269337] b_state=0x00000029, b_size=512 [ 498.273584] device loop0 blocksize: 4096 [ 498.278066] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 498.284360] b_state=0x00000029, b_size=512 [ 498.288692] device loop0 blocksize: 4096 [ 498.293130] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 498.299382] b_state=0x00000029, b_size=512 [ 498.303730] device loop0 blocksize: 4096 [ 498.309227] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 498.315599] b_state=0x00000029, b_size=512 [ 498.319900] device loop0 blocksize: 4096 [ 498.324430] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 498.330682] b_state=0x00000029, b_size=512 [ 498.334924] device loop0 blocksize: 4096 [ 498.339655] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 498.345939] b_state=0x00000029, b_size=512 [ 498.350248] device loop0 blocksize: 4096 [ 498.355047] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 498.361300] b_state=0x00000029, b_size=512 [ 498.365544] device loop0 blocksize: 4096 [ 498.370209] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 498.376496] b_state=0x00000029, b_size=512 [ 498.380800] device loop0 blocksize: 4096 [ 498.385661] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 498.391926] b_state=0x00000029, b_size=512 [ 498.396171] device loop0 blocksize: 4096 [ 498.407332] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 498.413580] b_state=0x00000029, b_size=512 [ 498.417825] device loop0 blocksize: 4096 [ 498.421984] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 498.428161] b_state=0x00000029, b_size=512 [ 498.432484] device loop0 blocksize: 4096 [ 498.436566] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 498.442770] b_state=0x00000029, b_size=512 [ 498.447016] device loop0 blocksize: 4096 [ 498.451191] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 498.457343] b_state=0x00000029, b_size=512 [ 498.461768] device loop0 blocksize: 4096 21:13:19 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$VIDIOC_S_EDID(0xffffffffffffffff, 0xc0245629, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/52) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r3 = add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000200)="9ff524cdf859d2b3bafea56e2b91ce16733f0273668ed6f183b5226c2bf05d669933cf4f562a19d8", 0x28, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, 0x0) keyctl$instantiate(0xc, r3, &(0x7f0000000380)=ANY=[@ANYBLOB='new ecryptfs user: 0000000000000069\x00'], 0x28, 0x0) 21:13:19 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2008000) sendfile(r0, r1, 0x0, 0x800000000031) 21:13:19 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="0749323abe4387662d10b7cd76fa130304000000000000c3c7ca160a7b5d2d82068cfdbb81a6fbf8c375677ecbc21685bc57675b607ac350289ac120719ff229bf6da4e191bcee0837dfcaac0518917528ba1d590f46b5240322c1f97f5c4d8903d2dc0096c5bef6b74708000000cee3d90f6aeb04fa55ff1c31d57645f77192b91cdc62428ab2742c28c1f44b81c71e1041fe412e2568ec39b7bf23bc2bc6568121b0bccf91b3c021816f242e3363a32511b78693f810a75ff82452b3f05889945d412d6ab8d78342575ee059a44b0df78589a0d3d84206481b05d31a0b973f091b08aa4adb561b5c54dcd8cf27e71d58a007a3b2124db2fbf1fcfc1ad861d18691d5a45b2538e8bb8c222996a29fd8f0736e446608ad03d2ba05579c93370b5ccff3d63b3cf3f2cfdb4472be1e7d4a6438746f9862e0e31656f65f9c3f378d4223029e18b18ba886f171cba9bd226ecd8effd793cca2458600f093fa20eeed1a05f54006656856445ae6800c9b9b"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:19 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x0, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:19 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dsp\x00', 0x800, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x68, r2, 0x101, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x80}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x880}, 0xc0) sched_yield() getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x1, 0x800, 0x8}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000380)=@assoc_id=r3, &(0x7f0000000500)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) restart_syscall() getsockname$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000004c0)={'vcan0\x00', r5}) fsetxattr$security_selinux(r0, &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:dhcpd_exec_t:s0\x00', 0x22, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180), &(0x7f0000000340)=0xa4332f27) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f00000000c0)=[@release={0x400c630f}], 0xfffffffffffffef7, 0x0, &(0x7f0000000180)}) [ 498.518084] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 498.524405] b_state=0x00000029, b_size=512 [ 498.528650] device loop0 blocksize: 4096 [ 498.548049] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 498.554470] b_state=0x00000029, b_size=512 [ 498.558721] device loop0 blocksize: 4096 21:13:19 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000002000)='./bus\x00', 0x8100, 0x49) ftruncate(r1, 0x2008000) sendfile(r0, r1, 0x0, 0x800000000031) socket$inet6(0xa, 0xa, 0x3) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000040)=0x8) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000240)={{0x1, @multicast2, 0x4e20, 0x4, 'sh\x00', 0x1, 0xff, 0x6a}, {@remote, 0x4e21, 0x0, 0x80000001, 0x10001, 0xfffffffffffffff9}}, 0x44) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000080)={0x0, 0x8ea}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000100)={r2, 0x4, 0x6, 0x9, 0x2, 0x61, 0x80000001, 0x2, {r3, @in6={{0xa, 0x4e21, 0x5b84, @dev={0xfe, 0x80, [], 0x10}, 0x8}}, 0x8, 0x4, 0x9, 0x0, 0xffffffff00000000}}, &(0x7f00000001c0)=0xb0) [ 498.583303] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 498.589526] b_state=0x00000029, b_size=512 [ 498.593872] device loop0 blocksize: 4096 [ 498.602928] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 498.609179] b_state=0x00000029, b_size=512 [ 498.613568] device loop0 blocksize: 4096 [ 498.618331] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 498.624618] b_state=0x00000029, b_size=512 [ 498.629033] device loop0 blocksize: 4096 [ 498.633474] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 498.639663] b_state=0x00000029, b_size=512 [ 498.643985] device loop0 blocksize: 4096 [ 498.699210] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 498.705580] b_state=0x00000029, b_size=512 [ 498.709867] device loop0 blocksize: 4096 21:13:19 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x20000, 0x0) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000040)="0299ec3cb7dc98db705d4a91325e82ca732cd1471cc81d4b875a04c0edc05f0a5bdf600219eeb19a51dd6ee83ef0fbc5fdbc70f9937a5f0e67fcab4377d6b51526e36cb321fad12da7b0243a2f36c2e37f983e7fe4e82f76dc3fc338fd3f") close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2008000) sendfile(r0, r2, 0x0, 0x800000000031) [ 498.773157] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 498.779447] b_state=0x00000029, b_size=512 [ 498.783793] device loop0 blocksize: 4096 [ 498.813072] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 498.819407] b_state=0x00000029, b_size=512 [ 498.823766] device loop0 blocksize: 4096 [ 498.828457] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 498.834812] b_state=0x00000029, b_size=512 [ 498.839058] device loop0 blocksize: 4096 [ 498.843428] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 498.849690] b_state=0x00000029, b_size=512 [ 498.854065] device loop0 blocksize: 4096 21:13:19 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x0, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:19 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 498.876843] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 498.883188] b_state=0x00000029, b_size=512 [ 498.887436] device loop0 blocksize: 4096 [ 498.903276] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 498.909512] b_state=0x00000029, b_size=512 [ 498.913950] device loop0 blocksize: 4096 21:13:19 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000000)=0x10000, 0x4) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2008000) sendfile(r0, r2, 0x0, 0x800000000031) [ 498.954989] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 498.961233] b_state=0x00000029, b_size=512 [ 498.965696] device loop0 blocksize: 4096 [ 499.008877] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 499.015249] b_state=0x00000029, b_size=512 [ 499.019496] device loop0 blocksize: 4096 [ 499.206305] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 499.212667] b_state=0x00000029, b_size=512 [ 499.217014] device loop0 blocksize: 4096 [ 499.244467] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 499.250974] b_state=0x00000029, b_size=512 [ 499.255225] device loop0 blocksize: 4096 21:13:20 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x0, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 499.307699] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 499.314040] b_state=0x00000029, b_size=512 [ 499.318384] device loop0 blocksize: 4096 [ 499.322752] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 499.329248] b_state=0x00000029, b_size=512 [ 499.333489] device loop0 blocksize: 4096 [ 499.447847] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 499.454050] b_state=0x00000029, b_size=512 [ 499.458386] device loop0 blocksize: 4096 21:13:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0x1005}}, 0x20) r3 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x2, 0x600000) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x368, 0x210, 0x100, 0x0, 0x100, 0x0, 0x2d0, 0x2d0, 0x2d0, 0x2d0, 0x2d0, 0x4, &(0x7f0000000200), {[{{@ip={@dev={0xac, 0x14, 0x14, 0x1d}, @loopback, 0xffffff00, 0xff0000ff, 'bond_slave_1\x00', 'nr0\x00', {}, {0xff}, 0x73, 0x3, 0x1}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x1, [0x80, 0x800, 0x2, 0x9, 0x0, 0x9], 0x40, 0x7}}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ip={@multicast2, @loopback, 0xffffffff, 0xff0000ff, 'nr0\x00', 'rose0\x00', {0xff}, {}, 0x73, 0x3, 0x33}, 0x0, 0xe8, 0x110, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}, @common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x60, 0x200, 0x0, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ip={@loopback, @empty, 0xff, 0xffffff00, 'ip6_vti0\x00', 'veth1_to_bridge\x00', {}, {}, 0xff, 0x2, 0x2}, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3c8) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000140)={0x13, 0x10, 0xfa00, {&(0x7f00000003c0), r2, 0x1}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x1, 0x2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x4, 0x3a0, 0x220, 0x0, 0x220, 0x0, 0x220, 0x308, 0x308, 0x308, 0x308, 0x308, 0x4, &(0x7f00000009c0), {[{{@ip={@multicast1, @rand_addr=0x100, 0x0, 0xffffffff, 'ip6_vti0\x00', 'ip6gre0\x00', {0xff}, {0xff}, 0x2, 0x0, 0x794f5765f4e84655}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x6, [0x1, 0xffff, 0xffffffffffffffe0, 0xfff, 0x80000001, 0x4], 0x3, 0x7fff}}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x6, 0xd308, 0x25d9}, {0x81, 0x81, 0x7}, {0xb18, 0x2, 0x7}, 0xfffffffffffffffb, 0x7ff}}}, {{@ip={@remote, @multicast1, 0xffffff00, 0xff, 'team_slave_0\x00', 'lo\x00', {0xff}, {0xff}, 0x3f, 0x3, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@common=@inet=@tos={0x28, 'tos\x00', 0x0, {0x7fffffff, 0xe1, 0x1}}, @common=@ttl={0x28, 'ttl\x00', 0x0, {0x3}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@unspec=@pkttype={0x28, 'pkttype\x00', 0x0, {0x1, 0x2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x400) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, r4, 0x1}}, 0x18) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000300)={&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000feb000/0x12000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ff2000/0xe000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff1000/0xc000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000feb000/0x4000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000000280)="903d26b17b610ec75a60a613c3ecc1ac07716cc19b09dd31d3a3ae371e297162f1621ba66bc292d7e3609ffe6a32bd7eb61e7bb81c04b290b8c24ab89f7d991691c2db04f6b0c3be0fe20c3867bdd4daf9cd6473bb3204469c0789c90b2c8ff5cafbd424", 0x64, r0}, 0x68) [ 499.501091] binder: undelivered death notification, 0000000000000000 [ 499.670944] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 499.677161] b_state=0x00000029, b_size=512 [ 499.681508] device loop0 blocksize: 4096 [ 499.685739] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 499.691969] b_state=0x00000029, b_size=512 [ 499.696218] device loop0 blocksize: 4096 [ 499.700533] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 499.706689] b_state=0x00000029, b_size=512 [ 499.711008] device loop0 blocksize: 4096 [ 499.716337] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 499.722583] b_state=0x00000029, b_size=512 [ 499.726830] device loop0 blocksize: 4096 [ 499.731134] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 499.737294] b_state=0x00000029, b_size=512 [ 499.741824] device loop0 blocksize: 4096 [ 499.834196] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 499.840499] b_state=0x00000029, b_size=512 [ 499.844831] device loop0 blocksize: 4096 [ 499.849581] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 499.855915] b_state=0x00000029, b_size=512 [ 499.860170] device loop0 blocksize: 4096 [ 499.864701] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 499.871011] b_state=0x00000029, b_size=512 [ 499.875265] device loop0 blocksize: 4096 [ 499.885864] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 499.892175] b_state=0x00000029, b_size=512 [ 499.896418] device loop0 blocksize: 4096 [ 499.900621] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 499.906902] b_state=0x00000029, b_size=512 [ 499.911160] device loop0 blocksize: 4096 [ 499.915512] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 499.921823] b_state=0x00000029, b_size=512 [ 499.926066] device loop0 blocksize: 4096 [ 499.930296] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 499.936576] b_state=0x00000029, b_size=512 [ 499.940823] device loop0 blocksize: 4096 [ 499.945075] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 499.951324] b_state=0x00000029, b_size=512 [ 499.955815] device loop0 blocksize: 4096 [ 499.965642] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 499.971891] b_state=0x00000029, b_size=512 [ 499.976149] device loop0 blocksize: 4096 [ 499.980289] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 499.986488] b_state=0x00000029, b_size=512 [ 499.990731] device loop0 blocksize: 4096 [ 500.000188] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.006439] b_state=0x00000029, b_size=512 [ 500.010680] device loop0 blocksize: 4096 [ 500.020243] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.026585] b_state=0x00000029, b_size=512 [ 500.030831] device loop0 blocksize: 4096 [ 500.038351] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.044583] b_state=0x00000029, b_size=512 [ 500.048826] device loop0 blocksize: 4096 [ 500.063134] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.069320] b_state=0x00000029, b_size=512 [ 500.073679] device loop0 blocksize: 4096 [ 500.105483] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.111683] b_state=0x00000029, b_size=512 [ 500.116153] device loop0 blocksize: 4096 [ 500.152012] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.158366] b_state=0x00000029, b_size=512 [ 500.162612] device loop0 blocksize: 4096 [ 500.167099] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.173286] b_state=0x00000029, b_size=512 [ 500.177621] device loop0 blocksize: 4096 [ 500.182170] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.188518] b_state=0x00000029, b_size=512 [ 500.192766] device loop0 blocksize: 4096 [ 500.198258] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.204659] b_state=0x00000029, b_size=512 [ 500.208908] device loop0 blocksize: 4096 [ 500.214526] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.220693] b_state=0x00000029, b_size=512 [ 500.225008] device loop0 blocksize: 4096 [ 500.244176] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.250357] b_state=0x00000029, b_size=512 [ 500.254667] device loop0 blocksize: 4096 [ 500.277404] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.283598] b_state=0x00000029, b_size=512 [ 500.287930] device loop0 blocksize: 4096 [ 500.292419] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.298708] b_state=0x00000029, b_size=512 [ 500.302955] device loop0 blocksize: 4096 [ 500.307219] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.313369] b_state=0x00000029, b_size=512 [ 500.317999] device loop0 blocksize: 4096 [ 500.322081] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.328317] b_state=0x00000029, b_size=512 [ 500.332557] device loop0 blocksize: 4096 [ 500.336729] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.342879] b_state=0x00000029, b_size=512 [ 500.347221] device loop0 blocksize: 4096 [ 500.351302] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.357506] b_state=0x00000029, b_size=512 [ 500.361748] device loop0 blocksize: 4096 [ 500.365884] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.372037] b_state=0x00000029, b_size=512 [ 500.376320] device loop0 blocksize: 4096 [ 500.380406] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.386642] b_state=0x00000029, b_size=512 [ 500.390903] device loop0 blocksize: 4096 [ 500.395046] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.401248] b_state=0x00000029, b_size=512 [ 500.405548] device loop0 blocksize: 4096 [ 500.409625] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.415831] b_state=0x00000029, b_size=512 [ 500.420072] device loop0 blocksize: 4096 [ 500.424164] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.430407] b_state=0x00000029, b_size=512 [ 500.434657] device loop0 blocksize: 4096 [ 500.438789] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.444944] b_state=0x00000029, b_size=512 [ 500.449240] device loop0 blocksize: 4096 [ 500.453323] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.459525] b_state=0x00000029, b_size=512 [ 500.463773] device loop0 blocksize: 4096 [ 500.467919] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.474073] b_state=0x00000029, b_size=512 [ 500.478365] device loop0 blocksize: 4096 [ 500.482488] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.488764] b_state=0x00000029, b_size=512 [ 500.493007] device loop0 blocksize: 4096 [ 500.497236] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.503560] b_state=0x00000029, b_size=512 [ 500.507863] device loop0 blocksize: 4096 [ 500.511960] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.518206] b_state=0x00000029, b_size=512 [ 500.522454] device loop0 blocksize: 4096 [ 500.526607] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.532764] b_state=0x00000029, b_size=512 [ 500.537054] device loop0 blocksize: 4096 [ 500.541169] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.547400] b_state=0x00000029, b_size=512 [ 500.551645] device loop0 blocksize: 4096 [ 500.555716] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.562079] b_state=0x00000029, b_size=512 [ 500.566345] device loop0 blocksize: 4096 [ 500.570489] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.576639] b_state=0x00000029, b_size=512 [ 500.580944] device loop0 blocksize: 4096 [ 500.585161] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.591376] b_state=0x00000029, b_size=512 [ 500.595618] device loop0 blocksize: 4096 [ 500.599786] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.605936] b_state=0x00000029, b_size=512 [ 500.610235] device loop0 blocksize: 4096 [ 500.614311] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.620508] b_state=0x00000029, b_size=512 [ 500.624755] device loop0 blocksize: 4096 [ 500.628918] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.635073] b_state=0x00000029, b_size=512 [ 500.639406] device loop0 blocksize: 4096 [ 500.643505] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.649735] b_state=0x00000029, b_size=512 [ 500.653982] device loop0 blocksize: 4096 [ 500.658103] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.664283] b_state=0x00000029, b_size=512 [ 500.668597] device loop0 blocksize: 4096 [ 500.672686] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.678905] b_state=0x00000029, b_size=512 [ 500.683172] device loop0 blocksize: 4096 [ 500.687244] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.693494] b_state=0x00000029, b_size=512 [ 500.697738] device loop0 blocksize: 4096 [ 500.701886] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.708133] b_state=0x00000029, b_size=512 [ 500.712379] device loop0 blocksize: 4096 [ 500.716439] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.722634] b_state=0x00000029, b_size=512 [ 500.726914] device loop0 blocksize: 4096 [ 500.731063] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.737219] b_state=0x00000029, b_size=512 [ 500.741519] device loop0 blocksize: 4096 [ 500.745612] __find_get_block_slow() failed. block=1, b_blocknr=8 21:13:21 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$VIDIOC_S_EDID(0xffffffffffffffff, 0xc0245629, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/52) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r3 = add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000200)="9ff524cdf859d2b3bafea56e2b91ce16733f0273668ed6f183b5226c2bf05d669933cf4f562a19d8", 0x28, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, 0x0) keyctl$instantiate(0xc, r3, &(0x7f0000000380)=ANY=[@ANYBLOB='new ecryptfs user: 0000000000000069\x00'], 0x28, 0x0) 21:13:21 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x0, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:21 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00\x00\x00\x00\x00\x00\x00\x00\x88', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000080)="82", 0x1) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x100000fffffffe) r2 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) acct(&(0x7f0000000140)='./file0/file0\x00') write$P9_RREAD(r2, &(0x7f0000000200)={0x76, 0x75, 0x0, {0x6b, "4a42d6a74bd560f471df53ea658a80c30735e695ca2f283b5198347e63c182cb61a105dc8eb3225db13831f318587746467966f6e3b3a0643ae9d3a7ff0a002f9692e475485b289c0987d8154a4434df3594b7a1fc5e839d8e36b427286438088cdba37314cfbc6e7f60fe"}}, 0x76) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f00000001c0)='/dev/usbmon#\x00') r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000100)={'team_slave_0\x00', 0x800}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) nanosleep(&(0x7f0000000580), &(0x7f00000005c0)) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f0000000000)=@dstopts, 0x8) write$P9_RREAD(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) socket$l2tp(0x18, 0x1, 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e22, @rand_addr=0x1}}, 0x7, 0x100000000, 0x3f, 0x8, 0x20}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, 0x0, 0x0) sendmmsg(r3, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) r4 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) utime(0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000400)=[@window, @sack_perm, @timestamp], 0x3) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r4, 0x0) lstat(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r1, &(0x7f0000000500)="6eab015c2322a39b07d021736f706e445b1724fe6aec231f2b80cc8b9f358be8b078622120105b8630fb70092985e2652c5d58543e44a2a4569c537e15722097e338ce", &(0x7f0000000700)=""/166}, 0xfffffe5d) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000340)=ANY=[@ANYBLOB="1946f2b665c3a05e2369def8e802000000000000000000000000000000"]}}, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000180)=0x42, 0x4) ioctl(r5, 0x0, 0x0) [ 500.751848] b_state=0x00000029, b_size=512 [ 500.756097] device loop0 blocksize: 4096 [ 500.760310] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.766473] b_state=0x00000029, b_size=512 [ 500.770823] device loop0 blocksize: 4096 [ 500.774924] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.781176] b_state=0x00000029, b_size=512 [ 500.785578] device loop0 blocksize: 4096 [ 500.789753] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.795908] b_state=0x00000029, b_size=512 [ 500.800217] device loop0 blocksize: 4096 21:13:21 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='smaps_rollup\x00') exit(0x0) mkdirat(r1, &(0x7f0000000140)='./file0\x00', 0x10000000000000) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x80) ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000040)=0x17) close(r1) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$SIOCX25SSUBSCRIP(r1, 0x89e1, &(0x7f00000001c0)={'dummy0\x00', 0x7f, 0x1f}) ftruncate(r3, 0x2008000) sendfile(r0, r3, 0x0, 0x800000000031) openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x101800, 0x0) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{}, {}, {}]}) 21:13:21 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm-monitor\x00', 0x408001, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000080)=0x4, 0x4) close(r0) r2 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) ioctl$VHOST_GET_VRING_BASE(r2, 0xc008af12, &(0x7f00000000c0)) sendmsg$xdp(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000100)="be0aa24aeb8cfd9ba73d3d35d36b2439dc546225528d340e89aafc911d9c8b9852cbb90a04475fc6366b711f8ff651d3e514f253135657d62802bb5030ebe14a8eb3e8f8", 0x44}, {&(0x7f0000000240)="e24a936ad44fc621f180f6fcc6e5338b94b1bc23d78c866ae4796d79c99c0bb55e13cb7274c8f2959953d783b348f6fca46959dd484fd341557f1dd271a563330c633b49b08fea028349739adbd84438a54af67bf54be95177c412ee3f0fbf68fb39d87247d06f21b857b36728d83f62706885f94f60e49939b43858b9f45a4320c034fbff3fc8243ff8b67ac7ca20e03355102255404fbcb1306b8e4cc69b6794d69db8f370c4a0aff9fe38bbb07b90e99ff06265b081cde71349cf6669d47bfc89c271da4abe347037dc93623fa398aeaa14ec873c5b36c9dbdea1b0fc7bbbfd88e1c44856b04e44b31e804fee9189378571f328", 0xf5}, {&(0x7f0000000180)="c7eb16ae869dfc21ac07c6e53efd2f588b7773036e31dbbe251681f3f2a42cea2f071bd56cf9b7ebb8976c626bf3579c7350bb4b80b89db0e2a97d61eac0fce1b767fdcf1eb3417dcd780591ad17561032", 0x51}, {&(0x7f0000000340)="dab27aaeadc2e27a6959aa8c37720e4583aacb1742c788804fd4e4c695833071f1d8fcfc1fd8d1b4e2a41a015417da7eda55a9877f3985d180aa64a486f91342b399545c5d0f71ce4dddaeb16230f37b77843a1a74adb41f8a52eb933487e581b42f324f888ea7cb60a395fecfe6bce2b853eefa74d1ce673fa473b9cb26f35daa36eb62", 0x84}, {&(0x7f0000000400)="929f93235e4d50a7a08b703903489dd1b95bba6c0b7413dac67bfae7eb4034519ad4b70d4a952a2df3e12ef0570168f40af76e08032480419ede5906d8e4c1fe86078fa474169519beeefa2f76666354b6c75ec966c7846a4128f92dc6756293fe80087fefef3f09c64fc81764e64d1b9cf0e012d0c6cb5a50e2750a17a6cf3455c199f8a09ee68d5eaa7aa85df9402cb6ca307a9c0d2e6ed52ab6365fc8ffea5f0dd53fc93f03fcfa0efc8d5b0fea4a457dd539b4542b9a8dc6d0524ef0d816cd2153ebba24a4cc85e716cc60c09958215e37df31fad5cbcf53", 0xda}], 0x5}, 0x4000) ftruncate(0xffffffffffffffff, 0x2008000) ioctl$SIOCRSGL2CALL(0xffffffffffffffff, 0x89e5, &(0x7f0000000000)) sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000000031) [ 500.807411] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.813684] b_state=0x00000029, b_size=512 [ 500.818061] device loop0 blocksize: 4096 [ 500.895832] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.902174] b_state=0x00000029, b_size=512 [ 500.906423] device loop0 blocksize: 4096 21:13:21 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2008000) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendfile(r3, r1, 0x0, 0x800000000031) 21:13:21 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000240)={0x0, 0x1000, "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"}, &(0x7f0000000000)=0x1008) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=r3, &(0x7f0000000080)=0x4) ftruncate(r2, 0x2008000) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000180)={{&(0x7f00000000c0)=""/93, 0x5d}, &(0x7f0000000140), 0x2}, 0x20) sendfile(r0, r2, 0x0, 0x800000000031) 21:13:22 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 500.977972] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 500.984352] b_state=0x00000029, b_size=512 [ 500.988605] device loop0 blocksize: 4096 21:13:22 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00\x00\x00\x00\x00\x00\x88\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="2cfef251f3a7720be4ceb8b35854ca7a150baf81613265a7ebd2881c22046b9e582f7933575510234b04090bb7e338f5bd0498de4b3ae9bf673f749d52ee4aee9156b84e6e699c752dda53812d0268a54ed4be69ef8b8c7e31aba751f3e34537a32486da8907fbdc3fbeae0f890000000000000000005a926124b2fff5b9fdee0eeef022345ea8f6db04a4076c1d89e6f72c05758deba7df675db8c38a4f8bc5ae0cb99f34d88606aae2e5f45f596cfeda781357c017cd683b9d059d56581fc99fe25b6531a54fb90fe070aa0165cd22061184336b580e4d2b46d7f5b52af278d29f27dc90f14a7f4556742ed5dd569626c1290a42b58c3b7e641cf8898da1de364ffd827b2b590c9e1b18969c9ac24cf71af43563d44470e5fbcecb24855fe2fae20dde43e308b83ed0985020a68d3ca25341c6191b6613f8887a7bf8d93ace30ae9a9ecab4", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 501.148982] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 501.155248] b_state=0x00000029, b_size=512 [ 501.159495] device loop0 blocksize: 4096 21:13:22 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2008000) sendfile(r0, r1, 0x0, 0x800000000031) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x3, @local, 0xc21b}, 0x1c) r2 = request_key(&(0x7f0000000040)='rxrpc\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='/dev/amidi#\x00', 0xfffffffffffffff8) keyctl$setperm(0x5, r2, 0x20000000) 21:13:22 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$VIDIOC_S_EDID(0xffffffffffffffff, 0xc0245629, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/52) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r3 = add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000200)="9ff524cdf859d2b3bafea56e2b91ce16733f0273668ed6f183b5226c2bf05d669933cf4f562a19d8", 0x28, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, 0x0) keyctl$instantiate(0xc, r3, &(0x7f0000000380)=ANY=[@ANYBLOB='new ecryptfs user: 0000000000000069\x00'], 0x28, 0x0) [ 501.353798] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 501.361669] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 501.367950] b_state=0x00000029, b_size=512 [ 501.372684] device loop0 blocksize: 4096 [ 501.377865] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 501.384357] b_state=0x00000029, b_size=512 [ 501.388608] device loop0 blocksize: 4096 21:13:22 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, 0x0) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r5 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r6 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r7}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r6, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r5, 0x8007ffc) sendfile(r2, r5, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="2cfef251f3a7720be4ceb8b35854ca7a150baf81613265a7ebd2881c22046b9e582f7933575510234b04090bb7e338f5bd0498de4b3ae9bf673f749d52ee4aee9156b84e6e699c752dda53812d0268a54ed4be69ef8b8c7e31aba751f3e34537a32486da8907fbdc3fbeae0f890000000000000000005a926124b2fff5b9fdee0eeef022345ea8f6db04a4076c1d89e6f72c05758deba7df675db8c38a4f8bc5ae0cb99f34d88606aae2e5f45f596cfeda781357c017cd683b9d059d56581fc99fe25b6531a54fb90fe070aa0165cd22061184336b580e4d2b46d7f5b52af278d29f27dc90f14a7f4556742ed5dd569626c1290a42b58c3b7e641cf8898da1de364ffd827b2b590c9e1b18969c9ac24cf71af43563d44470e5fbcecb24855fe2fae20dde43e308b83ed0985020a68d3ca25341c6191b6613f8887a7bf8d93ace30ae9a9ecab4", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 501.585264] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 501.591813] b_state=0x00000029, b_size=512 [ 501.596356] device loop0 blocksize: 4096 [ 501.603686] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 501.609954] b_state=0x00000029, b_size=512 [ 501.614204] device loop0 blocksize: 4096 [ 501.676190] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 501.682443] b_state=0x00000029, b_size=512 [ 501.686896] device loop0 blocksize: 4096 21:13:22 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00\x00\x00\x00\x00\x00\x11\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 501.866246] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 501.872884] b_state=0x00000029, b_size=512 [ 501.877152] device loop0 blocksize: 4096 [ 501.890073] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 501.896278] b_state=0x00000029, b_size=512 [ 501.900620] device loop0 blocksize: 4096 [ 501.904754] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 501.911046] b_state=0x00000029, b_size=512 [ 501.915293] device loop0 blocksize: 4096 [ 501.982868] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 501.989137] b_state=0x00000029, b_size=512 [ 501.993383] device loop0 blocksize: 4096 [ 501.997461] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 502.003678] b_state=0x00000029, b_size=512 [ 502.007923] device loop0 blocksize: 4096 [ 502.022709] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 502.029923] b_state=0x00000029, b_size=512 [ 502.034182] device loop0 blocksize: 4096 [ 502.038272] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 502.044523] b_state=0x00000029, b_size=512 [ 502.048768] device loop0 blocksize: 4096 [ 502.068352] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 502.074638] b_state=0x00000029, b_size=512 [ 502.079063] device loop0 blocksize: 4096 [ 502.085714] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 502.092167] b_state=0x00000029, b_size=512 [ 502.096414] device loop0 blocksize: 4096 [ 502.102354] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 502.108641] b_state=0x00000029, b_size=512 [ 502.112958] device loop0 blocksize: 4096 [ 502.117756] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 502.124110] b_state=0x00000029, b_size=512 [ 502.128383] device loop0 blocksize: 4096 [ 502.132873] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 502.139179] b_state=0x00000029, b_size=512 [ 502.143487] device loop0 blocksize: 4096 [ 502.147823] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 502.154292] b_state=0x00000029, b_size=512 [ 502.158542] device loop0 blocksize: 4096 [ 502.233478] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 502.239773] b_state=0x00000029, b_size=512 [ 502.244105] device loop0 blocksize: 4096 [ 502.248495] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 502.254802] b_state=0x00000029, b_size=512 [ 502.259140] device loop0 blocksize: 4096 [ 502.282182] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 502.288410] b_state=0x00000029, b_size=512 [ 502.292939] device loop0 blocksize: 4096 21:13:23 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffc) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000140)="9dac5a29adb61234f5216f938d93d3844c73051cb27f5d153dfcd8db6981d8246f5ed530f3c19e5bb2", 0x29) clock_getres(0x5, &(0x7f0000000100)) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, &(0x7f0000000000)=""/172) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000000c0), 0x4) sendfile(r0, r2, 0x0, 0x800000000031) [ 502.370669] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 502.377138] b_state=0x00000029, b_size=512 [ 502.381515] device loop0 blocksize: 4096 [ 502.386019] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 502.392358] b_state=0x00000029, b_size=512 [ 502.396676] device loop0 blocksize: 4096 [ 502.400763] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 502.407306] b_state=0x00000029, b_size=512 [ 502.411629] device loop0 blocksize: 4096 [ 502.426917] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 502.433321] b_state=0x00000029, b_size=512 [ 502.437574] device loop0 blocksize: 4096 [ 502.535173] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 502.541405] b_state=0x00000029, b_size=512 [ 502.545823] device loop0 blocksize: 4096 21:13:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000080)="82", 0x1) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x100000fffffffe) r2 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) acct(&(0x7f0000000140)='./file0/file0\x00') write$P9_RREAD(r2, &(0x7f0000000200)={0x76, 0x75, 0x0, {0x6b, "4a42d6a74bd560f471df53ea658a80c30735e695ca2f283b5198347e63c182cb61a105dc8eb3225db13831f318587746467966f6e3b3a0643ae9d3a7ff0a002f9692e475485b289c0987d8154a4434df3594b7a1fc5e839d8e36b427286438088cdba37314cfbc6e7f60fe"}}, 0x76) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f00000001c0)='/dev/usbmon#\x00') r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000100)={'team_slave_0\x00', 0x800}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) nanosleep(&(0x7f0000000580), &(0x7f00000005c0)) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f0000000000)=@dstopts, 0x8) write$P9_RREAD(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) socket$l2tp(0x18, 0x1, 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e22, @rand_addr=0x1}}, 0x7, 0x100000000, 0x3f, 0x8, 0x20}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, 0x0, 0x0) sendmmsg(r3, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) r4 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) utime(0x0, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000400)=[@window, @sack_perm, @timestamp], 0x3) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r4, 0x0) lstat(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r1, &(0x7f0000000500)="6eab015c2322a39b07d021736f706e445b1724fe6aec231f2b80cc8b9f358be8b078622120105b8630fb70092985e2652c5d58543e44a2a4569c537e15722097e338ce", &(0x7f0000000700)=""/166}, 0xfffffe5d) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000340)=ANY=[@ANYBLOB="1946f2b665c3a05e2369def8e802000000000000000000000000000000"]}}, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000180)=0x42, 0x4) ioctl(r5, 0x0, 0x0) 21:13:23 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:23 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00\x00\x00\x00\x00\x00\x88\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 502.606947] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 502.613496] b_state=0x00000029, b_size=512 [ 502.617971] device loop0 blocksize: 4096 [ 502.627429] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 502.633728] b_state=0x00000029, b_size=512 [ 502.638059] device loop0 blocksize: 4096 [ 502.642398] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 502.648740] b_state=0x00000029, b_size=512 [ 502.652989] device loop0 blocksize: 4096 21:13:23 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2008000) sendfile(r0, r1, 0x0, 0x800000000031) ioctl$KVM_TRANSLATE(r1, 0xc018ae85, &(0x7f0000000000)={0xd000, 0x0, 0x5, 0x5, 0x6}) [ 502.728207] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 502.734412] b_state=0x00000029, b_size=512 [ 502.738793] device loop0 blocksize: 4096 [ 502.743041] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 502.749315] b_state=0x00000029, b_size=512 [ 502.753560] device loop0 blocksize: 4096 21:13:23 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$VIDIOC_S_EDID(0xffffffffffffffff, 0xc0245629, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/52) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r3 = add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000200)="9ff524cdf859d2b3bafea56e2b91ce16733f0273668ed6f183b5226c2bf05d669933cf4f562a19d8", 0x28, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, 0x0) keyctl$instantiate(0xc, r3, &(0x7f0000000380)=ANY=[@ANYBLOB='new ecryptfs user: 0000000000000069\x00'], 0x28, 0x0) [ 502.837407] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 502.843643] b_state=0x00000029, b_size=512 [ 502.848130] device loop0 blocksize: 4096 [ 502.852374] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 502.858859] b_state=0x00000029, b_size=512 [ 502.863098] device loop0 blocksize: 4096 [ 502.886844] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 502.893034] b_state=0x00000029, b_size=512 [ 502.897537] device loop0 blocksize: 4096 21:13:24 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, 0x0, 0x0, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 503.122958] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 503.129409] b_state=0x00000029, b_size=512 [ 503.133654] device loop0 blocksize: 4096 21:13:24 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="2cfef251f3a7720be4ceb8b35854ca7a150baf81613265a7ebd2881c22046b9e582f7933575510234b04090bb7e338f5bd0498de4b3ae9bf673f749d52ee4aee9156b84e6e699c752dda53812d0268a54ed4be69ef8b8c7e31aba751f3e34537a32486da8907fbdc3fbeae0f890000000000000000005a926124b2fff5b9fdee0eeef022345ea8f6db04a4076c1d89e6f72c05758deba7df675db8c38a4f8bc5ae0cb99f34d88606aae2e5f45f596cfeda781357c017cd683b9d059d56581fc99fe25b6531a54fb90fe070aa0165cd22061184336b580e4d2b46d7f5b52af278d29f27dc90f14a7f4556742ed5dd569626c1290a42b58c3b7e641cf8898da1de364ffd827b2b590c9e1b18969c9ac24cf71af43563d44470e5fbcecb24855fe2fae20dde43e308b83ed0985020a68d3ca25341c6191b6613f8887a7bf8d93ace30ae9a9ecab4", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 503.196063] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 503.202553] b_state=0x00000029, b_size=512 [ 503.206802] device loop0 blocksize: 4096 21:13:24 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='smaps_rollup\x00') exit(0x0) mkdirat(r1, &(0x7f0000000140)='./file0\x00', 0x10000000000000) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x80) ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000040)=0x17) close(r1) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$SIOCX25SSUBSCRIP(r1, 0x89e1, &(0x7f00000001c0)={'dummy0\x00', 0x7f, 0x1f}) ftruncate(r3, 0x2008000) sendfile(r0, r3, 0x0, 0x800000000031) openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x101800, 0x0) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{}, {}, {}]}) [ 503.340327] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 503.346521] b_state=0x00000029, b_size=512 [ 503.350847] device loop0 blocksize: 4096 [ 503.428981] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 503.435373] b_state=0x00000029, b_size=512 [ 503.439611] device loop0 blocksize: 4096 21:13:24 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) signalfd(r0, &(0x7f0000000000)={0x4f06ec85}, 0x8) ftruncate(r2, 0x2008000) sendfile(r1, r0, 0x0, 0x800000000031) 21:13:24 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700), 0x0, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 503.516045] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 503.522479] b_state=0x00000029, b_size=512 [ 503.526718] device loop0 blocksize: 4096 21:13:24 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='smaps_rollup\x00') exit(0x0) mkdirat(r1, &(0x7f0000000140)='./file0\x00', 0x10000000000000) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x80) ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000040)=0x17) close(r1) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$SIOCX25SSUBSCRIP(r1, 0x89e1, &(0x7f00000001c0)={'dummy0\x00', 0x7f, 0x1f}) ftruncate(r3, 0x2008000) sendfile(r0, r3, 0x0, 0x800000000031) openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x101800, 0x0) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{}, {}, {}]}) [ 503.722521] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 503.728982] b_state=0x00000029, b_size=512 [ 503.733283] device loop0 blocksize: 4096 [ 503.760412] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 503.766770] b_state=0x00000029, b_size=512 [ 503.771009] device loop0 blocksize: 4096 21:13:24 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2008000) sendfile(r0, r2, 0x0, 0x800000000031) syz_kvm_setup_cpu$x86(r1, r1, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f0000000000)="c4e3f96c3761c7442400df570000c7442402c7000000c7442406000000000f011c240f0866baa100edd9ebb8000000000f23c80f21f835000020000f23f82e3e640f013866b8e0008ec0670fc75f0966b8b1008ec0", 0x55}], 0x1, 0xc, &(0x7f00000000c0), 0x0) 21:13:24 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 503.877240] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 503.883493] b_state=0x00000029, b_size=512 [ 503.887978] device loop0 blocksize: 4096 [ 503.895593] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 503.901901] b_state=0x00000029, b_size=512 [ 503.906234] device loop0 blocksize: 4096 21:13:24 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000000)=""/42) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x2, 0x208000) ioctl$KDGKBDIACR(r3, 0x4b4a, &(0x7f0000000240)=""/4096) ioctl$TCGETA(r3, 0x5405, &(0x7f00000000c0)) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f00000001c0)={0x6, 0x6, 0x0, 0xfffffffffffffffe, 0x4, 0x9}) ftruncate(r2, 0x2008000) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000040)=0x3, 0x4) sendfile(r0, r2, 0x0, 0x800000000031) getsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000000100)={@dev, @loopback, 0x0}, &(0x7f0000000140)=0xc) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f0000001300)={@xdp={0x2c, 0x4, r4, 0x14}, {&(0x7f0000001240)=""/185, 0xb9}, &(0x7f0000000180), 0x11}, 0xa0) [ 504.008934] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 504.015637] b_state=0x00000029, b_size=512 [ 504.019885] device loop0 blocksize: 4096 21:13:25 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='smaps_rollup\x00') exit(0x0) mkdirat(r1, &(0x7f0000000140)='./file0\x00', 0x10000000000000) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x80) ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000040)=0x17) close(r1) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$SIOCX25SSUBSCRIP(r1, 0x89e1, &(0x7f00000001c0)={'dummy0\x00', 0x7f, 0x1f}) ftruncate(r3, 0x2008000) sendfile(r0, r3, 0x0, 0x800000000031) openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x101800, 0x0) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{}, {}, {}]}) [ 504.086218] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 504.092415] b_state=0x00000029, b_size=512 [ 504.096724] device loop0 blocksize: 4096 21:13:25 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:25 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$VIDIOC_S_EDID(0xffffffffffffffff, 0xc0245629, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/52) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000200)="9ff524cdf859d2b3bafea56e2b91ce16733f0273668ed6f183b5226c2bf05d669933cf4f562a19d8", 0x28, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, 0x0) [ 504.139296] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 504.145490] b_state=0x00000029, b_size=512 [ 504.149857] device loop0 blocksize: 4096 [ 504.184287] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 504.190529] b_state=0x00000029, b_size=512 [ 504.194785] device loop0 blocksize: 4096 [ 504.243125] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 504.249539] b_state=0x00000029, b_size=512 [ 504.253778] device loop0 blocksize: 4096 [ 504.315289] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 504.321876] b_state=0x00000029, b_size=512 [ 504.326126] device loop0 blocksize: 4096 [ 504.333401] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 504.339673] b_state=0x00000029, b_size=512 [ 504.343952] device loop0 blocksize: 4096 [ 504.349428] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 504.355693] b_state=0x00000029, b_size=512 [ 504.360049] device loop0 blocksize: 4096 [ 504.367330] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 504.373841] b_state=0x00000029, b_size=512 [ 504.378084] device loop0 blocksize: 4096 [ 504.415525] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 504.439636] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 504.445877] b_state=0x00000029, b_size=512 [ 504.450222] device loop0 blocksize: 4096 [ 504.457065] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 504.463621] b_state=0x00000029, b_size=512 [ 504.467859] device loop0 blocksize: 4096 21:13:25 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="2cfef251f3a7720be4ceb8b35854ca7a150baf81613265a7ebd2881c22046b9e582f7933575510234b04090bb7e338f5bd0498de4b3ae9bf673f749d52ee4aee9156b84e6e699c752dda53812d0268a54ed4be69ef8b8c7e31aba751f3e34537a32486da8907fbdc3fbeae0f890000000000000000005a926124b2fff5b9fdee0eeef022345ea8f6db04a4076c1d89e6f72c05758deba7df675db8c38a4f8bc5ae0cb99f34d88606aae2e5f45f596cfeda781357c017cd683b9d059d56581fc99fe25b6531a54fb90fe070aa0165cd22061184336b580e4d2b46d7f5b52af278d29f27dc90f14a7f4556742ed5dd569626c1290a42b58c3b7e641cf8898da1de364ffd827b2b590c9e1b18969c9ac24cf71af43563d44470e5fbcecb24855fe2fae20dde43e308b83ed0985020a68d3ca25341c6191b6613f8887a7bf8d93ace30ae9a9ecab4", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 504.544397] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 504.550710] b_state=0x00000029, b_size=512 [ 504.554950] device loop0 blocksize: 4096 [ 504.559205] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 504.565462] b_state=0x00000029, b_size=512 [ 504.569704] device loop0 blocksize: 4096 [ 504.574143] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 504.580586] b_state=0x00000029, b_size=512 [ 504.584825] device loop0 blocksize: 4096 [ 504.596469] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 504.602918] b_state=0x00000029, b_size=512 [ 504.607163] device loop0 blocksize: 4096 [ 504.624954] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 504.631363] b_state=0x00000029, b_size=512 [ 504.635621] device loop0 blocksize: 4096 [ 504.641111] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 504.647401] b_state=0x00000029, b_size=512 [ 504.651902] device loop0 blocksize: 4096 [ 504.663823] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 504.670046] b_state=0x00000029, b_size=512 [ 504.674552] device loop0 blocksize: 4096 [ 504.688852] __find_get_block_slow() failed. block=1, b_blocknr=8 21:13:25 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 504.695126] b_state=0x00000029, b_size=512 [ 504.699360] device loop0 blocksize: 4096 [ 504.703639] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 504.709841] b_state=0x00000029, b_size=512 [ 504.714154] device loop0 blocksize: 4096 [ 504.718291] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 504.724779] b_state=0x00000029, b_size=512 [ 504.729016] device loop0 blocksize: 4096 21:13:25 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='smaps_rollup\x00') exit(0x0) mkdirat(r1, &(0x7f0000000140)='./file0\x00', 0x10000000000000) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x80) ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000040)=0x17) close(r1) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$SIOCX25SSUBSCRIP(r1, 0x89e1, &(0x7f00000001c0)={'dummy0\x00', 0x7f, 0x1f}) ftruncate(r3, 0x2008000) sendfile(r0, r3, 0x0, 0x800000000031) openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x101800, 0x0) [ 504.911803] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 504.918341] b_state=0x00000029, b_size=512 [ 504.922583] device loop0 blocksize: 4096 [ 505.006291] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 505.012545] b_state=0x00000029, b_size=512 [ 505.016892] device loop0 blocksize: 4096 [ 505.021479] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 505.027847] b_state=0x00000029, b_size=512 [ 505.032100] device loop0 blocksize: 4096 21:13:26 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$VIDIOC_S_EDID(0xffffffffffffffff, 0xc0245629, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/52) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000200)="9ff524cdf859d2b3bafea56e2b91ce16733f0273668ed6f183b5226c2bf05d669933cf4f562a19d8", 0x28, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, 0x0) [ 505.053720] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 505.060103] b_state=0x00000029, b_size=512 [ 505.064443] device loop0 blocksize: 4096 21:13:26 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='smaps_rollup\x00') exit(0x0) mkdirat(r1, &(0x7f0000000140)='./file0\x00', 0x10000000000000) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x80) ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000040)=0x17) close(r1) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$SIOCX25SSUBSCRIP(r1, 0x89e1, &(0x7f00000001c0)={'dummy0\x00', 0x7f, 0x1f}) ftruncate(r3, 0x2008000) sendfile(r0, r3, 0x0, 0x800000000031) [ 505.112448] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 505.118760] b_state=0x00000029, b_size=512 [ 505.123000] device loop0 blocksize: 4096 [ 505.133976] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 505.140295] b_state=0x00000029, b_size=512 [ 505.144535] device loop0 blocksize: 4096 [ 505.161036] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 505.167399] b_state=0x00000029, b_size=512 [ 505.171637] device loop0 blocksize: 4096 [ 505.175770] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 505.181919] b_state=0x00000029, b_size=512 [ 505.186251] device loop0 blocksize: 4096 [ 505.190331] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 505.196761] b_state=0x00000029, b_size=512 [ 505.200999] device loop0 blocksize: 4096 21:13:26 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000000000)='./bus\x00', 0x600, 0xd4) ftruncate(r2, 0x2008000) sendfile(r0, r2, 0x0, 0x800000000031) dup3(r0, r1, 0x80000) tee(r0, r2, 0xfff, 0xa) [ 505.211882] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 505.218338] b_state=0x00000029, b_size=512 [ 505.222609] device loop0 blocksize: 4096 [ 505.231484] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 505.237932] b_state=0x00000029, b_size=512 [ 505.242277] device loop0 blocksize: 4096 21:13:26 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2008000) sendfile(r0, r0, 0x0, 0x7) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000000)={0x300000000, 0x4, 0xffffffffffffffff}) 21:13:26 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="0749323abe4387662d10b7cd76fa130304000000000000c3c7ca160a7b5d2d82068cfdbb81a6fbf8c375677ecbc21685bc57675b607ac350289ac120719ff229bf6da4e191bcee0837dfcaac0518917528ba1d590f46b5240322c1f97f5c4d8903d2dc0096c5bef6b74708000000cee3d90f6aeb04fa55ff1c31d57645f77192b91cdc62428ab2742c28c1f44b81c71e1041fe412e2568ec39b7bf23bc2bc6568121b0bccf91b3c021816f242e3363a32511b78693f810a75ff82452b3f05889945d412d6ab8d78342575ee059a44b0df78589a0d3d84206481b05d31a0b973f091b08aa4adb561b5c54dcd8cf27e71d58a007a3b2124db2fbf1fcfc1ad861d18691d5a45b2538e8bb8c222996a29fd8f0736e446608ad03d2ba05579c93370b5ccff3d63b3cf3f2cfdb4472be1e7d4a6438746f9862e0e31656f65f9c3f378d4223029e18b18ba886f171cba9bd226ecd8effd793cca2458600f093fa20eeed1a05f54006656856445ae6800c9b9b"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:26 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 505.295487] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 505.301848] b_state=0x00000029, b_size=512 [ 505.306154] device loop0 blocksize: 4096 [ 505.348104] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 505.354571] b_state=0x00000029, b_size=512 [ 505.358939] device loop0 blocksize: 4096 [ 505.365705] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 505.372047] b_state=0x00000029, b_size=512 [ 505.376288] device loop0 blocksize: 4096 [ 505.384191] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 505.390574] b_state=0x00000029, b_size=512 [ 505.394844] device loop0 blocksize: 4096 21:13:26 executing program 0: eventfd2(0x0, 0x800) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2008000) sendfile(r0, r1, 0x0, 0x800000000031) 21:13:26 executing program 4: socket$inet6(0xa, 0x400000000001, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='smaps_rollup\x00') exit(0x0) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x10000000000000) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x80) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000040)=0x17) close(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f00000001c0)={'dummy0\x00', 0x7f, 0x1f}) ftruncate(r2, 0x2008000) [ 505.464218] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 505.470557] b_state=0x00000029, b_size=512 [ 505.474800] device loop0 blocksize: 4096 21:13:26 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f0000000040)={0x10203, 0x0, &(0x7f0000fff000/0x1000)=nil}) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2008000) sendfile(r1, r3, 0x0, 0x800000000031) [ 505.562333] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 505.568798] b_state=0x00000029, b_size=512 [ 505.573068] device loop0 blocksize: 4096 21:13:26 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$VIDIOC_S_EDID(0xffffffffffffffff, 0xc0245629, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/52) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000200)="9ff524cdf859d2b3bafea56e2b91ce16733f0273668ed6f183b5226c2bf05d669933cf4f562a19d8", 0x28, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, 0x0) [ 505.653056] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 505.659368] b_state=0x00000029, b_size=512 [ 505.663609] device loop0 blocksize: 4096 [ 505.699869] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 505.706142] b_state=0x00000029, b_size=512 [ 505.710680] device loop0 blocksize: 4096 [ 505.715022] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 505.721303] b_state=0x00000029, b_size=512 [ 505.725582] device loop0 blocksize: 4096 [ 505.731344] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 505.737582] b_state=0x00000029, b_size=512 [ 505.742057] device loop0 blocksize: 4096 21:13:26 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, 0x0, 0x0, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 505.764204] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 505.770586] b_state=0x00000029, b_size=512 [ 505.774848] device loop0 blocksize: 4096 [ 505.789659] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 505.796048] b_state=0x00000029, b_size=512 [ 505.800348] device loop0 blocksize: 4096 21:13:26 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:26 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2008000) sendfile(r0, r1, 0x0, 0x800000000031) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x20, @dev={0xfe, 0x80, [], 0xf}, 0x3}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000040)={'syz0', "31c831fb7d245de22e0e6a2cd5fba817508933e25ed25460f223c19d46ca0f93bd1f2a3c1518497dbc76a2dd2e4c1ef3effb4b2b5ddd180303ede9d321dfbfbeba4f59def2f6a5d04513de4505af7e9dfe924cf94cbe18793ce381c6648be880a1519e93b9ce6a264600bdc7f88cb26f0eaeb5ed9fb3e6ec6973062d481207217072b7f9a196b314ef5e19d3ffb0852a3142b7e2be1d4994f21a45f2cbeeeded"}, 0xa4) [ 505.934180] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 505.940377] b_state=0x00000029, b_size=512 [ 505.944871] device loop0 blocksize: 4096 [ 505.951809] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 505.958136] b_state=0x00000029, b_size=512 [ 505.962532] device loop0 blocksize: 4096 [ 505.995542] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 506.001765] b_state=0x00000029, b_size=512 [ 506.006098] device loop0 blocksize: 4096 [ 506.010255] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 506.016758] b_state=0x00000029, b_size=512 [ 506.020997] device loop0 blocksize: 4096 [ 506.087103] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 506.093456] b_state=0x00000029, b_size=512 [ 506.097694] device loop0 blocksize: 4096 [ 506.102189] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 506.108421] b_state=0x00000029, b_size=512 [ 506.112658] device loop0 blocksize: 4096 [ 506.117448] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 506.123641] b_state=0x00000029, b_size=512 [ 506.127879] device loop0 blocksize: 4096 [ 506.131950] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 506.138408] b_state=0x00000029, b_size=512 [ 506.142804] device loop0 blocksize: 4096 [ 506.323081] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 506.329420] b_state=0x00000029, b_size=512 [ 506.333662] device loop0 blocksize: 4096 [ 506.337937] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 506.344166] b_state=0x00000029, b_size=512 [ 506.348472] device loop0 blocksize: 4096 [ 506.352675] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 506.359114] b_state=0x00000029, b_size=512 [ 506.363367] device loop0 blocksize: 4096 [ 506.397139] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 506.403502] b_state=0x00000029, b_size=512 [ 506.407859] device loop0 blocksize: 4096 [ 506.412222] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 506.418701] b_state=0x00000029, b_size=512 [ 506.422953] device loop0 blocksize: 4096 [ 506.459830] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 506.466165] b_state=0x00000029, b_size=512 [ 506.470404] device loop0 blocksize: 4096 21:13:27 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:27 executing program 4: socket$inet6(0xa, 0x400000000001, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='smaps_rollup\x00') exit(0x0) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x10000000000000) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x80) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000040)=0x17) close(r0) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f00000001c0)={'dummy0\x00', 0x7f, 0x1f}) [ 506.508266] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 506.514454] b_state=0x00000029, b_size=512 [ 506.518916] device loop0 blocksize: 4096 21:13:27 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4000000008e, 0x200000) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2008000) sendfile(r0, r1, 0x0, 0x800000000031) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000000)) 21:13:27 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="2cfef251f3a7720be4ceb8b35854ca7a150baf81613265a7ebd2881c22046b9e582f7933575510234b04090bb7e338f5bd0498de4b3ae9bf673f749d52ee4aee9156b84e6e699c752dda53812d0268a54ed4be69ef8b8c7e31aba751f3e34537a32486da8907fbdc3fbeae0f890000000000000000005a926124b2fff5b9fdee0eeef022345ea8f6db04a4076c1d89e6f72c05758deba7df675db8c38a4f8bc5ae0cb99f34d88606aae2e5f45f596cfeda781357c017cd683b9d059d56581fc99fe25b6531a54fb90fe070aa0165cd22061184336b580e4d2b46d7f5b52af278d29f27dc90f14a7f4556742ed5dd569626c1290a42b58c3b7e641cf8898da1de364ffd827b2b590c9e1b18969c9ac24cf71af43563d44470e5fbcecb24855fe2fae20dde43e308b83ed0985020a68d3ca25341c6191b6613f8887a7bf8d93ace30ae9a9ecab4", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 506.765742] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 506.772068] b_state=0x00000029, b_size=512 [ 506.776309] device loop0 blocksize: 4096 [ 506.815502] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 506.821791] b_state=0x00000029, b_size=512 [ 506.826028] device loop0 blocksize: 4096 21:13:27 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$VIDIOC_S_EDID(0xffffffffffffffff, 0xc0245629, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/52) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r3 = add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000200)="9ff524cdf859d2b3bafea56e2b91ce16733f0273668ed6f183b5226c2bf05d669933cf4f562a19d8", 0x28, 0x0) keyctl$instantiate(0xc, r3, &(0x7f0000000380)=ANY=[@ANYBLOB='new ecryptfs user: 0000000000000069\x00'], 0x28, 0x0) [ 506.868877] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 506.875279] b_state=0x00000029, b_size=512 [ 506.879605] device loop0 blocksize: 4096 21:13:27 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x600, 0x0, 0x278, 0x160, 0x278, 0x0, 0x530, 0x530, 0x530, 0x530, 0x530, 0x4, &(0x7f00000000c0), {[{{@ipv6={@ipv4={[], [], @empty}, @local, [0xffffff00, 0xff0000ff, 0xff0000ff, 0xffffffff], [0x0, 0xffffffff, 0xffffff00], 'hwsim0\x00', 'vcan0\x00', {0xff}, {}, 0x1d, 0x7, 0x1, 0x48}, 0x0, 0x120, 0x160, 0x0, {}, [@common=@mh={0x28, 'mh\x00', 0x0, {0x100, 0x9, 0x1}}, @common=@inet=@udplite={0x30, 'udplite\x00', 0x0, {0x4e24, 0x4e22, 0x4e20, 0x4e23, 0x1}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x4ef7, 0xe2c, 0x8001}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00', 0x0, {0xe, 0x1000, 0x46d, 0x1}}]}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x0, 0x5}, {0x101, 0x70000000000, 0x7}}}}, {{@uncond, 0x0, 0x290, 0x2b8, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x7f, 0x7, 0x2, 0x2f, 0xd9, @mcast2, @local, @remote, [0xffffffff, 0xffffffff, 0xffffffff, 0xffffffff], [0x0, 0x0, 0xffffffff, 0xffffffff], [0xff, 0xffffffff, 0xffffffff, 0xffffff00], 0x4}}, @common=@rt={0x138, 'rt\x00', 0x0, {0xfffffffffffffffd, 0xff, 0x81, 0xfffffffffffffffb, 0x10, 0x2, [@loopback, @loopback, @mcast2, @local, @ipv4={[], [], @remote}, @loopback, @loopback, @mcast1, @empty, @remote, @dev={0xfe, 0x80, [], 0x1e}, @mcast2, @local, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @mcast2, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1f}}], 0x2}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x660) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="cc000004", @ANYRES32=r2, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x800) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x6) sendfile(r1, r3, 0x0, 0x800000000031) [ 506.919829] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 506.926075] b_state=0x00000029, b_size=512 [ 506.930538] device loop0 blocksize: 4096 [ 506.944385] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 506.950790] b_state=0x00000029, b_size=512 [ 506.955076] device loop0 blocksize: 4096 [ 506.960438] __find_get_block_slow() failed. block=1, b_blocknr=8 21:13:27 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="2cfef251f3a7720be4ceb8b35854ca7a150baf81613265a7ebd2881c22046b9e582f7933575510234b04090bb7e338f5bd0498de4b3ae9bf673f749d52ee4aee9156b84e6e699c752dda53812d0268a54ed4be69ef8b8c7e31aba751f3e34537a32486da8907fbdc3fbeae0f890000000000000000005a926124b2fff5b9fdee0eeef022345ea8f6db04a4076c1d89e6f72c05758deba7df675db8c38a4f8bc5ae0cb99f34d88606aae2e5f45f596cfeda781357c017cd683b9d059d56581fc99fe25b6531a54fb90fe070aa0165cd22061184336b580e4d2b46d7f5b52af278d29f27dc90f14a7f4556742ed5dd569626c1290a42b58c3b7e641cf8898da1de364ffd827b2b590c9e1b18969c9ac24cf71af43563d44470e5fbcecb24855fe2fae20dde43e308b83ed0985020a68d3ca25341c6191b6613f8887a7bf8d93ace30ae9a9ecab4", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 506.966657] b_state=0x00000029, b_size=512 [ 506.971011] device loop0 blocksize: 4096 [ 507.024464] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 507.030766] b_state=0x00000029, b_size=512 [ 507.035005] device loop0 blocksize: 4096 [ 507.066927] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 507.073334] b_state=0x00000029, b_size=512 [ 507.077576] device loop0 blocksize: 4096 [ 507.105922] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 507.112310] b_state=0x00000029, b_size=512 [ 507.116555] device loop0 blocksize: 4096 21:13:28 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x0, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 507.140595] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 507.146960] b_state=0x00000029, b_size=512 [ 507.151203] device loop0 blocksize: 4096 [ 507.188086] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 507.194415] b_state=0x00000029, b_size=512 [ 507.198667] device loop0 blocksize: 4096 [ 507.262205] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 507.268614] b_state=0x00000029, b_size=512 [ 507.272922] device loop0 blocksize: 4096 21:13:28 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2008000) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x1e, "9be5c0a4b1d28f0f11f7deb8adbd2acef283648cde13561ded8e6c19beda"}, &(0x7f00000000c0)=0x26) ioctl$NBD_SET_BLKSIZE(r2, 0xab01, 0x23) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={r3, 0x3}, &(0x7f0000000140)=0x8) sendfile(r0, r2, 0x0, 0x800000000031) [ 507.329737] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 507.336031] b_state=0x00000029, b_size=512 [ 507.340277] device loop0 blocksize: 4096 [ 507.416928] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 507.423188] b_state=0x00000029, b_size=512 [ 507.427525] device loop0 blocksize: 4096 [ 507.442185] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 507.448504] b_state=0x00000029, b_size=512 [ 507.452762] device loop0 blocksize: 4096 21:13:28 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 507.470726] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 507.477067] b_state=0x00000029, b_size=512 [ 507.481324] device loop0 blocksize: 4096 [ 507.487759] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 507.495576] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 507.501808] b_state=0x00000029, b_size=512 [ 507.506323] device loop0 blocksize: 4096 [ 507.532716] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 507.539078] b_state=0x00000029, b_size=512 [ 507.543322] device loop0 blocksize: 4096 [ 507.550211] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 507.556496] b_state=0x00000029, b_size=512 [ 507.560730] device loop0 blocksize: 4096 [ 507.566084] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 507.572347] b_state=0x00000029, b_size=512 [ 507.576794] device loop0 blocksize: 4096 21:13:28 executing program 4: socket$inet6(0xa, 0x400000000001, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='smaps_rollup\x00') exit(0x0) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x10000000000000) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x80) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000040)=0x17) close(r0) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) 21:13:28 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r5 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r6 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r7}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r6, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r5, 0x8007ffc) sendfile(r2, r5, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:28 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$VIDIOC_S_EDID(0xffffffffffffffff, 0xc0245629, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/52) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r3 = add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000200)="9ff524cdf859d2b3bafea56e2b91ce16733f0273668ed6f183b5226c2bf05d669933cf4f562a19d8", 0x28, 0x0) keyctl$instantiate(0xc, r3, &(0x7f0000000380)=ANY=[@ANYBLOB='new ecryptfs user: 0000000000000069\x00'], 0x28, 0x0) [ 507.646435] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 507.652773] b_state=0x00000029, b_size=512 [ 507.657214] device loop0 blocksize: 4096 21:13:28 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x3, 0x1ff) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2008000) socket$inet_tcp(0x2, 0x1, 0x0) sendfile(r0, r1, 0x0, 0x800000000031) [ 507.732171] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 507.738498] b_state=0x00000029, b_size=512 [ 507.742767] device loop0 blocksize: 4096 [ 507.750838] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 507.757278] b_state=0x00000029, b_size=512 [ 507.761514] device loop0 blocksize: 4096 [ 507.772363] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 507.778640] b_state=0x00000029, b_size=512 [ 507.782880] device loop0 blocksize: 4096 [ 507.801470] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 507.807735] b_state=0x00000029, b_size=512 [ 507.811974] device loop0 blocksize: 4096 [ 507.816988] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 507.823186] b_state=0x00000029, b_size=512 [ 507.827708] device loop0 blocksize: 4096 [ 507.833407] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 507.839791] b_state=0x00000029, b_size=512 [ 507.844043] device loop0 blocksize: 4096 21:13:28 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:29 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x60, {{0xa, 0x4e23, 0x9, @empty, 0x5}}, {{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7}}}, 0x108) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2008000) sendfile(r0, r1, 0x0, 0x800000000031) 21:13:29 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={0x0, r5+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r6 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r7 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r8}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r7, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r6, 0x8007ffc) sendfile(r2, r6, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 508.382053] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 508.388310] b_state=0x00000029, b_size=512 [ 508.392848] device loop0 blocksize: 4096 21:13:29 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x42100, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x1b, &(0x7f0000000040), &(0x7f0000000080)=0x4) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2008000) sendfile(r0, r2, 0x0, 0x800000000031) [ 508.442002] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 508.448301] b_state=0x00000029, b_size=512 [ 508.452667] device loop0 blocksize: 4096 [ 508.457374] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 508.463677] b_state=0x00000029, b_size=512 [ 508.467941] device loop0 blocksize: 4096 [ 508.498620] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 508.505058] b_state=0x00000029, b_size=512 [ 508.509297] device loop0 blocksize: 4096 [ 508.544009] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 508.550205] b_state=0x00000029, b_size=512 [ 508.554528] device loop0 blocksize: 4096 [ 508.558729] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 508.565273] b_state=0x00000029, b_size=512 [ 508.569512] device loop0 blocksize: 4096 [ 508.591298] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 508.597635] b_state=0x00000029, b_size=512 [ 508.601884] device loop0 blocksize: 4096 [ 508.699753] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 508.706251] b_state=0x00000029, b_size=512 [ 508.710492] device loop0 blocksize: 4096 [ 508.716500] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 508.722693] b_state=0x00000029, b_size=512 [ 508.727175] device loop0 blocksize: 4096 [ 508.739797] __find_get_block_slow() failed. block=1, b_blocknr=8 21:13:29 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, 0x0}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r6 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r7 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r8}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r7, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r6, 0x8007ffc) sendfile(r2, r6, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) [ 508.746221] b_state=0x00000029, b_size=512 [ 508.750455] device loop0 blocksize: 4096 [ 508.768856] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 508.775257] b_state=0x00000029, b_size=512 [ 508.779501] device loop0 blocksize: 4096 writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 508.806968] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 508.813314] b_state=0x00000029, b_size=512 [ 508.817768] device loop0 blocksize: 4096 21:13:29 executing program 4: socket$inet6(0xa, 0x400000000001, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='smaps_rollup\x00') exit(0x0) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x10000000000000) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x80) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000040)=0x17) close(r0) [ 508.854065] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 508.860370] b_state=0x00000029, b_size=512 [ 508.864606] device loop0 blocksize: 4096 [ 508.875897] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 508.882050] b_state=0x00000029, b_size=512 [ 508.886564] device loop0 blocksize: 4096 [ 508.969208] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 508.975531] b_state=0x00000029, b_size=512 [ 508.980050] device loop0 blocksize: 4096 21:13:30 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x800000000000000) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2008000) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x3) sendfile(r0, r2, 0x0, 0x800000000031) write$P9_RWRITE(r2, &(0x7f0000000000)={0xb, 0x77, 0x1, 0xd3d2}, 0xb) [ 509.104998] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 509.111257] b_state=0x00000029, b_size=512 [ 509.115510] device loop0 blocksize: 4096 [ 509.119839] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 509.125990] b_state=0x00000029, b_size=512 [ 509.130468] device loop0 blocksize: 4096 21:13:30 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x3) ftruncate(r1, 0x2008000) sendfile(r0, r1, 0x0, 0x800000000031) 21:13:30 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$VIDIOC_S_EDID(0xffffffffffffffff, 0xc0245629, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/52) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='new ecryptfs user: 0000000000000069\x00'], 0x28, 0x0) [ 509.260783] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 509.267028] b_state=0x00000029, b_size=512 [ 509.271342] device loop0 blocksize: 4096 [ 509.293711] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 509.300030] b_state=0x00000029, b_size=512 [ 509.304267] device loop0 blocksize: 4096 [ 509.310306] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 509.316546] b_state=0x00000029, b_size=512 [ 509.320990] device loop0 blocksize: 4096 [ 509.348545] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 509.355041] b_state=0x00000029, b_size=512 21:13:30 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 509.359285] device loop0 blocksize: 4096 [ 509.477823] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 509.484182] b_state=0x00000029, b_size=512 [ 509.488428] device loop0 blocksize: 4096 21:13:30 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 509.581501] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 509.588013] b_state=0x00000029, b_size=512 [ 509.592320] device loop0 blocksize: 4096 [ 509.649137] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 509.655756] b_state=0x00000029, b_size=512 [ 509.659995] device loop0 blocksize: 4096 [ 509.730100] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 509.736595] b_state=0x00000029, b_size=512 [ 509.740838] device loop0 blocksize: 4096 [ 509.746741] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 509.752916] b_state=0x00000029, b_size=512 [ 509.757256] device loop0 blocksize: 4096 [ 509.761430] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 509.767650] b_state=0x00000029, b_size=512 [ 509.771910] device loop0 blocksize: 4096 [ 509.776800] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 509.782957] b_state=0x00000029, b_size=512 [ 509.787273] device loop0 blocksize: 4096 [ 509.791667] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 509.798129] b_state=0x00000029, b_size=512 [ 509.802370] device loop0 blocksize: 4096 21:13:30 executing program 4: socket$inet6(0xa, 0x400000000001, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='smaps_rollup\x00') exit(0x0) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x10000000000000) creat(&(0x7f0000000000)='./bus\x00', 0x80) close(r0) [ 509.982172] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 509.988547] b_state=0x00000029, b_size=512 [ 509.992782] device loop0 blocksize: 4096 [ 509.997729] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 510.003955] b_state=0x00000029, b_size=512 [ 510.008433] device loop0 blocksize: 4096 [ 510.074380] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 510.080754] b_state=0x00000029, b_size=512 [ 510.085012] device loop0 blocksize: 4096 [ 510.142347] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 510.149037] b_state=0x00000029, b_size=512 [ 510.153288] device loop0 blocksize: 4096 [ 510.214501] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 510.220823] b_state=0x00000029, b_size=512 [ 510.225065] device loop0 blocksize: 4096 [ 510.230283] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 510.236666] b_state=0x00000029, b_size=512 [ 510.241028] device loop0 blocksize: 4096 [ 510.245363] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 510.251744] b_state=0x00000029, b_size=512 [ 510.255996] device loop0 blocksize: 4096 21:13:31 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:31 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, 0x0, 0x0) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:31 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) write$P9_RWSTAT(r1, &(0x7f0000000000)={0x7, 0x7f, 0x1}, 0x7) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2008000) sendfile(r0, r2, 0x0, 0x800000000031) 21:13:31 executing program 2: r0 = socket$inet6(0xa, 0x410000000001, 0x0) close(r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa0, 0xb8, 0x0, {"e4c7a3e1246474e0360951c025bf52360edbdb70090f4be8068ac9e64693dfa3cdc8f89f3b87b01daf595aa33975f442cbe8854456d1176b97d8226fed3faf5c108eaf244bd3c7d1879a26c1864cb080b047bf636eb66c6ab3979db4e54af242f7a041094716d4fb542a5d37e2b4fcb21e69118869156948aee20f28130c24928f59c674495c2728d6e7e53e8530c163f80dbc1f6343633e5f4fd2879a58e6"}}, {0x0, "76dd87afdf51f2"}}, &(0x7f0000000100)=""/138, 0xc1, 0x8a, 0x1}, 0x20) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r2, 0x0, 0x70bd26, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x40801}, 0x8000) ftruncate(r1, 0x2008000) [ 510.260441] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 510.266821] b_state=0x00000029, b_size=512 [ 510.271188] device loop0 blocksize: 4096 [ 510.275585] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 510.282069] b_state=0x00000029, b_size=512 [ 510.286341] device loop0 blocksize: 4096 [ 510.290812] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 510.297240] b_state=0x00000029, b_size=512 [ 510.301581] device loop0 blocksize: 4096 [ 510.308526] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 510.315001] b_state=0x00000029, b_size=512 [ 510.319360] device loop0 blocksize: 4096 [ 510.324933] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 510.331385] b_state=0x00000029, b_size=512 [ 510.335815] device loop0 blocksize: 4096 [ 510.340742] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 510.347194] b_state=0x00000029, b_size=512 [ 510.351562] device loop0 blocksize: 4096 [ 510.356479] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 510.362911] b_state=0x00000029, b_size=512 [ 510.367153] device loop0 blocksize: 4096 21:13:31 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$VIDIOC_S_EDID(0xffffffffffffffff, 0xc0245629, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/52) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='new ecryptfs user: 0000000000000069\x00'], 0x28, 0x0) [ 510.436290] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 510.442753] b_state=0x00000029, b_size=512 [ 510.447023] device loop0 blocksize: 4096 [ 510.504904] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 510.511281] b_state=0x00000029, b_size=512 [ 510.515534] device loop0 blocksize: 4096 [ 510.542239] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 510.549132] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 510.555696] b_state=0x00000029, b_size=512 [ 510.559995] device loop0 blocksize: 4096 [ 510.612589] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 510.618805] b_state=0x00000029, b_size=512 [ 510.623267] device loop0 blocksize: 4096 [ 510.637319] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 510.643579] b_state=0x00000029, b_size=512 [ 510.647811] device loop0 blocksize: 4096 [ 510.651944] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 510.658244] b_state=0x00000029, b_size=512 21:13:31 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000080)='cifs.idmap\x00', 0x0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2008000) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f00000000c0)={0x6, 0x8001, 0x21, 'queue0\x00', 0x7}) sendfile(r0, r2, 0x0, 0x800000000031) [ 510.662554] device loop0 blocksize: 4096 [ 510.666884] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 510.673373] b_state=0x00000029, b_size=512 [ 510.677640] device loop0 blocksize: 4096 [ 510.708433] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 510.714773] b_state=0x00000029, b_size=512 [ 510.719025] device loop0 blocksize: 4096 [ 510.723537] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 510.729824] b_state=0x00000029, b_size=512 [ 510.734139] device loop0 blocksize: 4096 [ 510.738878] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 510.745330] b_state=0x00000029, b_size=512 [ 510.749567] device loop0 blocksize: 4096 21:13:31 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 510.817033] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 510.823279] b_state=0x00000029, b_size=512 [ 510.827512] device loop0 blocksize: 4096 [ 510.831588] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 510.838006] b_state=0x00000029, b_size=512 [ 510.842314] device loop0 blocksize: 4096 [ 510.851560] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 510.857936] b_state=0x00000029, b_size=512 [ 510.862222] device loop0 blocksize: 4096 [ 510.866872] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 510.873395] b_state=0x00000029, b_size=512 [ 510.877636] device loop0 blocksize: 4096 [ 510.888289] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 510.894661] b_state=0x00000029, b_size=512 [ 510.898897] device loop0 blocksize: 4096 [ 510.908064] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 510.914347] b_state=0x00000029, b_size=512 [ 510.918582] device loop0 blocksize: 4096 [ 510.922909] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 510.929097] b_state=0x00000029, b_size=512 [ 510.933561] device loop0 blocksize: 4096 [ 510.937764] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 510.943972] b_state=0x00000029, b_size=512 [ 510.948204] device loop0 blocksize: 4096 [ 510.952366] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 510.958838] b_state=0x00000029, b_size=512 [ 510.963116] device loop0 blocksize: 4096 [ 510.972222] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 510.978525] b_state=0x00000029, b_size=512 [ 510.982781] device loop0 blocksize: 4096 21:13:31 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00\x00\x00\x00\x00\x00\x00\x00\x11', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 511.016254] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 511.022466] b_state=0x00000029, b_size=512 [ 511.026760] device loop0 blocksize: 4096 [ 511.071379] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 511.077684] b_state=0x00000029, b_size=512 [ 511.081922] device loop0 blocksize: 4096 21:13:32 executing program 4: socket$inet6(0xa, 0x400000000001, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='smaps_rollup\x00') exit(0x0) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x10000000000000) close(r0) [ 511.235201] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 511.241572] b_state=0x00000029, b_size=512 [ 511.245987] device loop0 blocksize: 4096 [ 511.291280] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 511.297613] b_state=0x00000029, b_size=512 [ 511.301852] device loop0 blocksize: 4096 [ 511.327837] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 511.334021] b_state=0x00000029, b_size=512 [ 511.338467] device loop0 blocksize: 4096 [ 511.349272] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 511.355480] b_state=0x00000029, b_size=512 [ 511.359786] device loop0 blocksize: 4096 [ 511.371047] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 511.377411] b_state=0x00000029, b_size=512 [ 511.381662] device loop0 blocksize: 4096 [ 511.394204] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 511.400430] b_state=0x00000029, b_size=512 [ 511.404671] device loop0 blocksize: 4096 [ 511.446672] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 511.452970] b_state=0x00000029, b_size=512 [ 511.457525] device loop0 blocksize: 4096 [ 511.465945] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 511.472243] b_state=0x00000029, b_size=512 [ 511.476497] device loop0 blocksize: 4096 [ 511.497238] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 511.503502] b_state=0x00000029, b_size=512 [ 511.507796] device loop0 blocksize: 4096 [ 511.511916] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 511.518115] b_state=0x00000029, b_size=512 [ 511.522359] device loop0 blocksize: 4096 [ 511.526430] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 511.532908] b_state=0x00000029, b_size=512 [ 511.537173] device loop0 blocksize: 4096 21:13:32 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000000)={0x8, 0x3}) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x2) ftruncate(r2, 0x2008001) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendfile(r0, r2, 0x0, 0x800000000031) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f00000000c0)={0xfffffffffffffffc, {{0xa, 0x4e21, 0x3, @remote, 0x6}}}, 0x88) syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x0, 0xa0001) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000040)={[{0x6, 0x0, 0x5, 0x1f, 0xffffffffffffffff, 0xfffffffffffff801, 0x5d7, 0x6, 0x6, 0x4, 0x9, 0x5, 0x9}, {0x2, 0x1, 0x6, 0x4, 0x0, 0x5609, 0x20, 0x401, 0x9, 0x7, 0xfffffffffffffe83, 0xfffffffffffff19c, 0x40}, {0x0, 0x8, 0x565, 0x3b1, 0x5d7, 0x1, 0x1ff, 0x5, 0x9, 0x7fffffff, 0x40, 0xadea, 0x3}], 0x6}) 21:13:32 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00'}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 511.602020] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 511.608212] b_state=0x00000029, b_size=512 [ 511.612545] device loop0 blocksize: 4096 [ 511.616628] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 511.623081] b_state=0x00000029, b_size=512 [ 511.627336] device loop0 blocksize: 4096 [ 511.689300] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 511.695487] b_state=0x00000029, b_size=512 [ 511.699831] device loop0 blocksize: 4096 [ 511.704052] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 511.710257] b_state=0x00000029, b_size=512 [ 511.714491] device loop0 blocksize: 4096 [ 511.718565] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 511.724789] b_state=0x00000029, b_size=512 [ 511.729020] device loop0 blocksize: 4096 [ 511.733298] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 511.739700] b_state=0x00000029, b_size=512 [ 511.743936] device loop0 blocksize: 4096 [ 511.752611] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 511.758957] b_state=0x00000029, b_size=512 [ 511.763418] device loop0 blocksize: 4096 21:13:32 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$VIDIOC_S_EDID(0xffffffffffffffff, 0xc0245629, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/52) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r3 = add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000200)="9ff524cdf859d2b3bafea56e2b91ce16733f0273668ed6f183b5226c2bf05d669933cf4f562a19d8", 0x28, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, 0x0) keyctl$instantiate(0xc, r3, &(0x7f0000000380)=ANY=[@ANYBLOB='new ecryptfs user: 0000000000000069\x00'], 0x28, 0x0) [ 511.836636] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 511.842970] b_state=0x00000029, b_size=512 [ 511.847209] device loop0 blocksize: 4096 [ 511.887794] audit: type=1804 audit(5840716412.760:124): pid=20059 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir048627339/syzkaller.VsHQoN/59/bus" dev="sda1" ino=16881 res=1 21:13:32 executing program 2: r0 = getpgid(0xffffffffffffffff) syz_open_procfs(r0, &(0x7f0000000000)='net/dev\x00') r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r2, 0x0, 0x800000000031) accept4(r2, &(0x7f0000000040)=@ax25={{0x3, @bcast}, [@netrom, @null, @remote, @default, @bcast, @remote, @netrom, @null]}, &(0x7f00000000c0)=0x80, 0x800) [ 511.987887] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 511.994257] b_state=0x00000029, b_size=512 [ 511.998515] device loop0 blocksize: 4096 [ 512.002666] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 512.008809] b_state=0x00000029, b_size=512 [ 512.013307] device loop0 blocksize: 4096 [ 512.025703] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 512.032092] b_state=0x00000029, b_size=512 [ 512.036339] device loop0 blocksize: 4096 21:13:32 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(0xffffffffffffffff, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="2cfef251f3a7720be4ceb8b35854ca7a150baf81613265a7ebd2881c22046b9e582f7933575510234b04090bb7e338f5bd0498de4b3ae9bf673f749d52ee4aee9156b84e6e699c752dda53812d0268a54ed4be69ef8b8c7e31aba751f3e34537a32486da8907fbdc3fbeae0f890000000000000000005a926124b2fff5b9fdee0eeef022345ea8f6db04a4076c1d89e6f72c05758deba7df675db8c38a4f8bc5ae0cb99f34d88606aae2e5f45f596cfeda781357c017cd683b9d059d56581fc99fe25b6531a54fb90fe070aa0165cd22061184336b580e4d2b46d7f5b52af278d29f27dc90f14a7f4556742ed5dd569626c1290a42b58c3b7e641cf8898da1de364ffd827b2b590c9e1b18969c9ac24cf71af43563d44470e5fbcecb24855fe2fae20dde43e308b83ed0985020a68d3ca25341c6191b6613f8887a7bf8d93ace30ae9a9ecab4", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 512.080202] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 512.086906] b_state=0x00000029, b_size=512 [ 512.091184] device loop0 blocksize: 4096 21:13:33 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 512.312617] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 512.319079] b_state=0x00000029, b_size=512 [ 512.323347] device loop0 blocksize: 4096 21:13:33 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) fcntl$setflags(r0, 0x2, 0x1) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x7, 0x40) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000240)={{0x1, 0x0, 0xffffffffffffffff, 0x3c7, 'syz0\x00', 0xac3}, 0x0, [0x7, 0x2, 0x401, 0xfffffffffffffffa, 0x96, 0xff, 0x64, 0xffff, 0xff, 0x2, 0x0, 0x6aa0, 0x65ee, 0x8, 0x7fff, 0x7, 0x9, 0x8, 0x80, 0x2, 0x5, 0xffffffff, 0x1, 0x8, 0xfff, 0xfffffffffffffffe, 0x3ff, 0x3, 0x100, 0xf5, 0xffffffffffffffff, 0x4, 0x8, 0x9, 0x3, 0x7ff, 0xc14, 0x6, 0x0, 0x0, 0x2a3a, 0x7fffffff, 0xa0, 0x7a3c669b, 0xaa, 0x1, 0x9, 0x3, 0x5, 0xf5, 0x80000001, 0x23b, 0x4, 0x4, 0x8, 0x37, 0x81, 0x3, 0x4c20, 0x6, 0x9, 0x1, 0x10001, 0x7, 0x8, 0x7ff, 0xffffffff, 0x6, 0x6, 0x3, 0x6, 0x3, 0x401, 0x9, 0x8, 0x3, 0x7fffffff, 0x1, 0x2, 0x100000001, 0xa9, 0x5, 0x2, 0x65, 0xfff, 0x10000, 0x28, 0x1e3a, 0x8, 0xfffffffffffffffa, 0x4, 0x6, 0xffffffffffff0000, 0xb5c5, 0x1a2, 0x1, 0x0, 0x101, 0x4a, 0x100, 0x6, 0x7f, 0x101, 0xa6, 0x8, 0x983, 0x2, 0x3, 0xd35, 0x3, 0x934, 0xfd5, 0x1, 0x3, 0x22f, 0x4696, 0x9, 0x80, 0xfffffffffffffffe, 0x8, 0x2, 0x0, 0x800, 0x5, 0x101, 0x8, 0x4, 0x40], {r2, r3+30000000}}) close(r0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2008000) sendfile(r0, r4, 0x0, 0x800000000031) [ 512.357351] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 512.363580] b_state=0x00000029, b_size=512 [ 512.368066] device loop0 blocksize: 4096 [ 512.406892] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 512.413131] b_state=0x00000029, b_size=512 [ 512.417474] device loop0 blocksize: 4096 [ 512.443448] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 512.449707] b_state=0x00000029, b_size=512 [ 512.453950] device loop0 blocksize: 4096 [ 512.472043] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 512.478417] b_state=0x00000029, b_size=512 [ 512.482652] device loop0 blocksize: 4096 [ 512.517467] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 512.523693] b_state=0x00000029, b_size=512 [ 512.528218] device loop0 blocksize: 4096 [ 512.540308] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 512.546712] b_state=0x00000029, b_size=512 [ 512.550946] device loop0 blocksize: 4096 [ 512.555189] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 512.561539] b_state=0x00000029, b_size=512 21:13:33 executing program 4: socket$inet6(0xa, 0x400000000001, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='smaps_rollup\x00') exit(0x0) close(r0) 21:13:33 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$VIDIOC_S_EDID(0xffffffffffffffff, 0xc0245629, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/52) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r3 = add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000200)="9ff524cdf859d2b3bafea56e2b91ce16733f0273668ed6f183b5226c2bf05d669933cf4f562a19d8", 0x28, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, 0x0) keyctl$instantiate(0xc, r3, &(0x7f0000000380)=ANY=[@ANYBLOB='new ecryptfs user: 0000000000000069\x00'], 0x28, 0x0) 21:13:33 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, 0x0, &(0x7f0000000540)) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 512.565773] device loop0 blocksize: 4096 [ 512.569909] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 512.576059] b_state=0x00000029, b_size=512 [ 512.580577] device loop0 blocksize: 4096 [ 512.593240] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 512.599623] b_state=0x00000029, b_size=512 [ 512.603870] device loop0 blocksize: 4096 [ 512.636355] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 512.642654] b_state=0x00000029, b_size=512 [ 512.646894] device loop0 blocksize: 4096 [ 512.669390] audit: type=1804 audit(5840716413.554:125): pid=20086 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir048627339/syzkaller.VsHQoN/59/bus" dev="sda1" ino=16881 res=1 [ 512.815045] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 512.821305] b_state=0x00000029, b_size=512 [ 512.825554] device loop0 blocksize: 4096 [ 512.829831] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 512.835986] b_state=0x00000029, b_size=512 [ 512.840313] device loop0 blocksize: 4096 [ 512.844749] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 512.850983] b_state=0x00000029, b_size=512 [ 512.855218] device loop0 blocksize: 4096 [ 512.860691] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 512.866942] b_state=0x00000029, b_size=512 [ 512.871233] device loop0 blocksize: 4096 [ 512.881638] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 512.887928] b_state=0x00000029, b_size=512 [ 512.892234] device loop0 blocksize: 4096 21:13:33 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x4, 0x10000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000040)=0x3f) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x1002) sendfile(r0, r2, 0x0, 0x800000000031) [ 512.956301] audit: type=1804 audit(5840716413.554:126): pid=20066 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir048627339/syzkaller.VsHQoN/59/bus" dev="sda1" ino=16881 res=1 [ 512.983921] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 512.990187] b_state=0x00000029, b_size=512 [ 512.994422] device loop0 blocksize: 4096 [ 512.999011] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 513.005446] b_state=0x00000029, b_size=512 [ 513.009682] device loop0 blocksize: 4096 [ 513.015687] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 513.022058] b_state=0x00000029, b_size=512 [ 513.026299] device loop0 blocksize: 4096 [ 513.035270] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 513.041759] b_state=0x00000029, b_size=512 [ 513.045999] device loop0 blocksize: 4096 [ 513.050310] __find_get_block_slow() failed. block=1, b_blocknr=8 21:13:33 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 513.056622] b_state=0x00000029, b_size=512 [ 513.060941] device loop0 blocksize: 4096 [ 513.066383] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 513.072842] b_state=0x00000029, b_size=512 [ 513.077083] device loop0 blocksize: 4096 [ 513.086238] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 513.092823] b_state=0x00000029, b_size=512 [ 513.097073] device loop0 blocksize: 4096 [ 513.119503] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 513.125793] b_state=0x00000029, b_size=512 [ 513.130033] device loop0 blocksize: 4096 [ 513.134348] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 513.140539] b_state=0x00000029, b_size=512 [ 513.145008] device loop0 blocksize: 4096 21:13:34 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x0) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="0749323abe4387662d10b7cd76fa130304000000000000c3c7ca160a7b5d2d82068cfdbb81a6fbf8c375677ecbc21685bc57675b607ac350289ac120719ff229bf6da4e191bcee0837dfcaac0518917528ba1d590f46b5240322c1f97f5c4d8903d2dc0096c5bef6b74708000000cee3d90f6aeb04fa55ff1c31d57645f77192b91cdc62428ab2742c28c1f44b81c71e1041fe412e2568ec39b7bf23bc2bc6568121b0bccf91b3c021816f242e3363a32511b78693f810a75ff82452b3f05889945d412d6ab8d78342575ee059a44b0df78589a0d3d84206481b05d31a0b973f091b08aa4adb561b5c54dcd8cf27e71d58a007a3b2124db2fbf1fcfc1ad861d18691d5a45b2538e8bb8c222996a29fd8f0736e446608ad03d2ba05579c93370b5ccff3d63b3cf3f2cfdb4472be1e7d4a6438746f9862e0e31656f65f9c3f378d4223029e18b18ba886f171cba9bd226ecd8effd793cca2458600f093fa20eeed1a05f54006656856445ae6800c9b9b"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 513.263469] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 513.269680] b_state=0x00000029, b_size=512 [ 513.273977] device loop0 blocksize: 4096 [ 513.328223] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 513.334475] b_state=0x00000029, b_size=512 [ 513.338715] device loop0 blocksize: 4096 [ 513.343022] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 513.349180] b_state=0x00000029, b_size=512 [ 513.353701] device loop0 blocksize: 4096 [ 513.412728] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 513.419034] b_state=0x00000029, b_size=512 [ 513.423290] device loop0 blocksize: 4096 [ 513.428690] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 513.435059] b_state=0x00000029, b_size=512 [ 513.439313] device loop0 blocksize: 4096 [ 513.519789] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 513.526084] b_state=0x00000029, b_size=512 [ 513.530332] device loop0 blocksize: 4096 [ 513.539695] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 513.545919] b_state=0x00000029, b_size=512 [ 513.550153] device loop0 blocksize: 4096 [ 513.554271] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 513.560517] b_state=0x00000029, b_size=512 [ 513.565030] device loop0 blocksize: 4096 21:13:34 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$VIDIOC_S_EDID(0xffffffffffffffff, 0xc0245629, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/52) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r3 = add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000200)="9ff524cdf859d2b3bafea56e2b91ce16733f0273668ed6f183b5226c2bf05d669933cf4f562a19d8", 0x28, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, 0x0) keyctl$instantiate(0xc, r3, &(0x7f0000000380)=ANY=[@ANYBLOB='new ecryptfs user: 0000000000000069\x00'], 0x28, 0x0) 21:13:34 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x6000, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2008000) sendfile(r0, r1, 0x0, 0x800000000031) 21:13:34 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x3, 0x9}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000080)={r2, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x17}}}, 0x29, 0x6}, 0x90) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2008000) sendfile(r1, r3, 0x0, 0x9) 21:13:34 executing program 4: socket$inet6(0xa, 0x400000000001, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='smaps_rollup\x00') close(r0) [ 513.662165] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 513.675781] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 513.682046] b_state=0x00000029, b_size=512 [ 513.686540] device loop0 blocksize: 4096 [ 513.696223] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 513.702438] b_state=0x00000029, b_size=512 [ 513.706774] device loop0 blocksize: 4096 21:13:34 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(0x0, 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="2cfef251f3a7720be4ceb8b35854ca7a150baf81613265a7ebd2881c22046b9e582f7933575510234b04090bb7e338f5bd0498de4b3ae9bf673f749d52ee4aee9156b84e6e699c752dda53812d0268a54ed4be69ef8b8c7e31aba751f3e34537a32486da8907fbdc3fbeae0f890000000000000000005a926124b2fff5b9fdee0eeef022345ea8f6db04a4076c1d89e6f72c05758deba7df675db8c38a4f8bc5ae0cb99f34d88606aae2e5f45f596cfeda781357c017cd683b9d059d56581fc99fe25b6531a54fb90fe070aa0165cd22061184336b580e4d2b46d7f5b52af278d29f27dc90f14a7f4556742ed5dd569626c1290a42b58c3b7e641cf8898da1de364ffd827b2b590c9e1b18969c9ac24cf71af43563d44470e5fbcecb24855fe2fae20dde43e308b83ed0985020a68d3ca25341c6191b6613f8887a7bf8d93ace30ae9a9ecab4", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 513.815373] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 513.821860] b_state=0x00000029, b_size=512 [ 513.826118] device loop0 blocksize: 4096 [ 513.849880] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 513.856240] b_state=0x00000029, b_size=512 [ 513.860542] device loop0 blocksize: 4096 [ 513.874673] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 513.880967] b_state=0x00000029, b_size=512 [ 513.885207] device loop0 blocksize: 4096 21:13:34 executing program 4: socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) [ 513.936464] audit: type=1800 audit(5840716414.793:127): pid=20127 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor2" name="bus" dev="sda1" ino=17185 res=0 [ 513.942785] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 513.961458] b_state=0x00000029, b_size=512 [ 513.965695] device loop0 blocksize: 4096 [ 514.028309] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 514.034649] b_state=0x00000029, b_size=512 [ 514.038952] device loop0 blocksize: 4096 [ 514.043361] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 514.049598] b_state=0x00000029, b_size=512 [ 514.053836] device loop0 blocksize: 4096 [ 514.057958] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 514.064233] b_state=0x00000029, b_size=512 [ 514.068468] device loop0 blocksize: 4096 21:13:35 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$VIDIOC_S_EDID(0xffffffffffffffff, 0xc0245629, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r3 = add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000200)="9ff524cdf859d2b3bafea56e2b91ce16733f0273668ed6f183b5226c2bf05d669933cf4f562a19d8", 0x28, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, 0x0) keyctl$instantiate(0xc, r3, &(0x7f0000000380)=ANY=[@ANYBLOB='new ecryptfs user: 0000000000000069\x00'], 0x28, 0x0) [ 514.072830] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 514.079068] b_state=0x00000029, b_size=512 [ 514.083304] device loop0 blocksize: 4096 [ 514.087429] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 514.093920] b_state=0x00000029, b_size=512 [ 514.098176] device loop0 blocksize: 4096 21:13:35 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) fsync(r0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getsockopt$inet6_udp_int(r3, 0x11, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0x4) ftruncate(r2, 0x2008000) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) sendfile(r0, r2, 0x0, 0x800000000031) 21:13:35 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 514.174110] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 514.180542] b_state=0x00000029, b_size=512 [ 514.184780] device loop0 blocksize: 4096 [ 514.191990] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 514.198168] b_state=0x00000029, b_size=512 [ 514.202523] device loop0 blocksize: 4096 21:13:35 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='smaps_rollup\x00') close(r0) 21:13:35 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x0, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="2cfef251f3a7720be4ceb8b35854ca7a150baf81613265a7ebd2881c22046b9e582f7933575510234b04090bb7e338f5bd0498de4b3ae9bf673f749d52ee4aee9156b84e6e699c752dda53812d0268a54ed4be69ef8b8c7e31aba751f3e34537a32486da8907fbdc3fbeae0f890000000000000000005a926124b2fff5b9fdee0eeef022345ea8f6db04a4076c1d89e6f72c05758deba7df675db8c38a4f8bc5ae0cb99f34d88606aae2e5f45f596cfeda781357c017cd683b9d059d56581fc99fe25b6531a54fb90fe070aa0165cd22061184336b580e4d2b46d7f5b52af278d29f27dc90f14a7f4556742ed5dd569626c1290a42b58c3b7e641cf8898da1de364ffd827b2b590c9e1b18969c9ac24cf71af43563d44470e5fbcecb24855fe2fae20dde43e308b83ed0985020a68d3ca25341c6191b6613f8887a7bf8d93ace30ae9a9ecab4", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 514.497178] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 514.503594] b_state=0x00000029, b_size=512 [ 514.507830] device loop0 blocksize: 4096 [ 514.512249] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 514.518724] b_state=0x00000029, b_size=512 [ 514.523023] device loop0 blocksize: 4096 [ 514.527770] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 514.534219] b_state=0x00000029, b_size=512 [ 514.538460] device loop0 blocksize: 4096 21:13:35 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) close(r0) [ 514.550375] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 514.556807] b_state=0x00000029, b_size=512 [ 514.561049] device loop0 blocksize: 4096 [ 514.566076] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 514.572278] b_state=0x00000029, b_size=512 [ 514.576606] device loop0 blocksize: 4096 [ 514.580828] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 514.587269] b_state=0x00000029, b_size=512 [ 514.591509] device loop0 blocksize: 4096 21:13:35 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="2cfef251f3a7720be4ceb8b35854ca7a150baf81613265a7ebd2881c22046b9e582f7933575510234b04090bb7e338f5bd0498de4b3ae9bf673f749d52ee4aee9156b84e6e699c752dda53812d0268a54ed4be69ef8b8c7e31aba751f3e34537a32486da8907fbdc3fbeae0f890000000000000000005a926124b2fff5b9fdee0eeef022345ea8f6db04a4076c1d89e6f72c05758deba7df675db8c38a4f8bc5ae0cb99f34d88606aae2e5f45f596cfeda781357c017cd683b9d059d56581fc99fe25b6531a54fb90fe070aa0165cd22061184336b580e4d2b46d7f5b52af278d29f27dc90f14a7f4556742ed5dd569626c1290a42b58c3b7e641cf8898da1de364ffd827b2b590c9e1b18969c9ac24cf71af43563d44470e5fbcecb24855fe2fae20dde43e308b83ed0985020a68d3ca25341c6191b6613f8887a7bf8d93ace30ae9a9ecab4", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 514.674755] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 514.680991] b_state=0x00000029, b_size=512 [ 514.685436] device loop0 blocksize: 4096 [ 514.712049] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 514.718411] b_state=0x00000029, b_size=512 [ 514.722646] device loop0 blocksize: 4096 [ 514.873812] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 514.880082] b_state=0x00000029, b_size=512 [ 514.884319] device loop0 blocksize: 4096 [ 514.889378] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 514.895559] b_state=0x00000029, b_size=512 [ 514.899954] device loop0 blocksize: 4096 [ 514.904037] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 514.910229] b_state=0x00000029, b_size=512 [ 514.914468] device loop0 blocksize: 4096 21:13:35 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2008000) sendfile(r0, r2, 0x0, 0x800000000031) dup3(r0, r1, 0x80000) 21:13:35 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$VIDIOC_S_EDID(0xffffffffffffffff, 0xc0245629, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r3 = add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000200)="9ff524cdf859d2b3bafea56e2b91ce16733f0273668ed6f183b5226c2bf05d669933cf4f562a19d8", 0x28, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, 0x0) keyctl$instantiate(0xc, r3, &(0x7f0000000380)=ANY=[@ANYBLOB='new ecryptfs user: 0000000000000069\x00'], 0x28, 0x0) 21:13:35 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='smaps_rollup\x00') close(0xffffffffffffffff) 21:13:35 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 514.918623] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 514.924769] b_state=0x00000029, b_size=512 [ 514.929047] device loop0 blocksize: 4096 [ 514.933131] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 514.939524] b_state=0x00000029, b_size=512 [ 514.943766] device loop0 blocksize: 4096 21:13:36 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$VIDIOC_S_EDID(0xffffffffffffffff, 0xc0245629, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/52) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='new ecryptfs user: 0000000000000069\x00'], 0x28, 0x0) [ 515.231327] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 515.237695] b_state=0x00000029, b_size=512 [ 515.242142] device loop0 blocksize: 4096 [ 515.270416] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 515.276640] b_state=0x00000029, b_size=512 21:13:36 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 515.281069] device loop0 blocksize: 4096 [ 515.286837] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 515.293313] b_state=0x00000029, b_size=512 [ 515.297549] device loop0 blocksize: 4096 21:13:36 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141040, 0xc8) ftruncate(r1, 0x2008000) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000040)=""/128, 0x20000}, 0x18) sendfile(r0, r1, 0x0, 0x800000000031) 21:13:36 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:36 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="0749323abe4387662d10b7cd76fa130304000000000000c3c7ca160a7b5d2d82068cfdbb81a6fbf8c375677ecbc21685bc57675b607ac350289ac120719ff229bf6da4e191bcee0837dfcaac0518917528ba1d590f46b5240322c1f97f5c4d8903d2dc0096c5bef6b74708000000cee3d90f6aeb04fa55ff1c31d57645f77192b91cdc62428ab2742c28c1f44b81c71e1041fe412e2568ec39b7bf23bc2bc6568121b0bccf91b3c021816f242e3363a32511b78693f810a75ff82452b3f05889945d412d6ab8d78342575ee059a44b0df78589a0d3d84206481b05d31a0b973f091b08aa4adb561b5c54dcd8cf27e71d58a007a3b2124db2fbf1fcfc1ad861d18691d5a45b2538e8bb8c222996a29fd8f0736e446608ad03d2ba05579c93370b5ccff3d63b3cf3f2cfdb4472be1e7d4a6438746f9862e0e31656f65f9c3f378d4223029e18b18ba886f171cba9bd226ecd8effd793cca2458600f093fa20eeed1a05f54006656856445ae6800c9b9b"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:36 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2008000) sendfile(r0, r1, 0x0, 0x800000000031) open(&(0x7f0000000000)='./bus\x00', 0x105400, 0x89) [ 516.015097] audit: type=1804 audit(5840716416.856:128): pid=20197 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir440165481/syzkaller.DyWurO/369/bus" dev="sda1" ino=17377 res=1 21:13:36 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2008000) getsockname(r0, &(0x7f0000000000)=@alg, &(0x7f0000000080)=0x80) sendfile(r0, r1, 0x0, 0x800000000031) [ 516.098081] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 516.104293] b_state=0x00000029, b_size=512 [ 516.108687] device loop0 blocksize: 4096 21:13:37 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$VIDIOC_S_EDID(0xffffffffffffffff, 0xc0245629, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/52) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r3 = add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000200)="9ff524cdf859d2b3bafea56e2b91ce16733f0273668ed6f183b5226c2bf05d669933cf4f562a19d8", 0x28, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, 0x0) keyctl$instantiate(0xc, r3, &(0x7f0000000380)=ANY=[@ANYBLOB='new ecryptfs user: 0000000000000069\x00'], 0x28, 0x0) 21:13:37 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) socket$inet6(0xa, 0x3, 0x7f226174) ftruncate(r1, 0x2008000) sendfile(r0, r1, 0x0, 0x100000001) [ 516.144660] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 516.150987] b_state=0x00000029, b_size=512 [ 516.155227] device loop0 blocksize: 4096 21:13:37 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00\x00\x00\x00\x00\x00\x00\x00\x88', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="2cfef251f3a7720be4ceb8b35854ca7a150baf81613265a7ebd2881c22046b9e582f7933575510234b04090bb7e338f5bd0498de4b3ae9bf673f749d52ee4aee9156b84e6e699c752dda53812d0268a54ed4be69ef8b8c7e31aba751f3e34537a32486da8907fbdc3fbeae0f890000000000000000005a926124b2fff5b9fdee0eeef022345ea8f6db04a4076c1d89e6f72c05758deba7df675db8c38a4f8bc5ae0cb99f34d88606aae2e5f45f596cfeda781357c017cd683b9d059d56581fc99fe25b6531a54fb90fe070aa0165cd22061184336b580e4d2b46d7f5b52af278d29f27dc90f14a7f4556742ed5dd569626c1290a42b58c3b7e641cf8898da1de364ffd827b2b590c9e1b18969c9ac24cf71af43563d44470e5fbcecb24855fe2fae20dde43e308b83ed0985020a68d3ca25341c6191b6613f8887a7bf8d93ace30ae9a9ecab4", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 516.229579] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 516.235881] b_state=0x00000029, b_size=512 [ 516.240225] device loop0 blocksize: 4096 [ 516.284359] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 516.290847] b_state=0x00000029, b_size=512 [ 516.295092] device loop0 blocksize: 4096 21:13:37 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:37 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$VIDIOC_S_EDID(0xffffffffffffffff, 0xc0245629, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/52) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='new ecryptfs user: 0000000000000069\x00'], 0x28, 0x0) [ 516.621238] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 516.627468] b_state=0x00000029, b_size=512 [ 516.631799] device loop0 blocksize: 4096 [ 516.709254] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 516.715605] b_state=0x00000029, b_size=512 [ 516.719844] device loop0 blocksize: 4096 21:13:37 executing program 2: r0 = socket$inet6(0xa, 0x400000000802, 0xfffffffffffffe01) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00') write$P9_RLCREATE(r1, &(0x7f0000000040)={0x18, 0xf, 0x1, {{0x4, 0x2, 0x3}, 0x401}}, 0x18) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) rt_sigsuspend(&(0x7f0000000080), 0x8) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x104) sendfile(r0, r2, 0x0, 0x2) fchmod(r2, 0x104) 21:13:37 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00\x00\x00\x00\x00\x00\x00\x00\x11', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 516.990569] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 516.997633] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 517.003868] b_state=0x00000029, b_size=512 [ 517.008104] device loop0 blocksize: 4096 [ 517.012813] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 517.019312] b_state=0x00000029, b_size=512 [ 517.023634] device loop0 blocksize: 4096 [ 517.032698] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 517.039003] b_state=0x00000029, b_size=512 [ 517.043328] device loop0 blocksize: 4096 [ 517.059542] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 517.065806] b_state=0x00000029, b_size=512 [ 517.070047] device loop0 blocksize: 4096 [ 517.074713] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 517.080949] b_state=0x00000029, b_size=512 [ 517.085391] device loop0 blocksize: 4096 21:13:38 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, 0x0, &(0x7f00000003c0)) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200), &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="0749323abe4387662d10b7cd76fa130304000000000000c3c7ca160a7b5d2d82068cfdbb81a6fbf8c375677ecbc21685bc57675b607ac350289ac120719ff229bf6da4e191bcee0837dfcaac0518917528ba1d590f46b5240322c1f97f5c4d8903d2dc0096c5bef6b74708000000cee3d90f6aeb04fa55ff1c31d57645f77192b91cdc62428ab2742c28c1f44b81c71e1041fe412e2568ec39b7bf23bc2bc6568121b0bccf91b3c021816f242e3363a32511b78693f810a75ff82452b3f05889945d412d6ab8d78342575ee059a44b0df78589a0d3d84206481b05d31a0b973f091b08aa4adb561b5c54dcd8cf27e71d58a007a3b2124db2fbf1fcfc1ad861d18691d5a45b2538e8bb8c222996a29fd8f0736e446608ad03d2ba05579c93370b5ccff3d63b3cf3f2cfdb4472be1e7d4a6438746f9862e0e31656f65f9c3f378d4223029e18b18ba886f171cba9bd226ecd8effd793cca2458600f093fa20eeed1a05f54006656856445ae6800c9b9b"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 517.212972] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 517.220345] b_state=0x00000029, b_size=512 [ 517.224613] device loop0 blocksize: 4096 [ 517.244537] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 517.250971] b_state=0x00000029, b_size=512 [ 517.255265] device loop0 blocksize: 4096 21:13:38 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2008000) sendfile(r0, r2, 0x0, 0x800000000031) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0xb) 21:13:38 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$VIDIOC_S_EDID(0xffffffffffffffff, 0xc0245629, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/52) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r3 = add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000200)="9ff524cdf859d2b3bafea56e2b91ce16733f0273668ed6f183b5226c2bf05d669933cf4f562a19d8", 0x28, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, 0x0) keyctl$instantiate(0xc, r3, &(0x7f0000000380)=ANY=[@ANYBLOB='new ecryptfs user: 0000000000000069\x00'], 0x28, 0x0) [ 517.295444] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 517.301969] b_state=0x00000029, b_size=512 [ 517.306327] device loop0 blocksize: 4096 [ 517.356623] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 517.362908] b_state=0x00000029, b_size=512 [ 517.367421] device loop0 blocksize: 4096 [ 517.406963] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 517.413388] b_state=0x00000029, b_size=512 [ 517.417805] device loop0 blocksize: 4096 [ 517.427676] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 517.434011] b_state=0x00000029, b_size=512 [ 517.438463] device loop0 blocksize: 4096 [ 517.444271] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 517.450595] b_state=0x00000029, b_size=512 [ 517.454842] device loop0 blocksize: 4096 [ 517.459536] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 517.465989] b_state=0x00000029, b_size=512 [ 517.470399] device loop0 blocksize: 4096 [ 517.478276] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 517.484448] b_state=0x00000029, b_size=512 [ 517.488792] device loop0 blocksize: 4096 [ 517.493578] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 517.499925] b_state=0x00000029, b_size=512 [ 517.504174] device loop0 blocksize: 4096 [ 517.614005] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 517.620598] b_state=0x00000029, b_size=512 [ 517.624855] device loop0 blocksize: 4096 [ 517.633874] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 517.640301] b_state=0x00000029, b_size=512 [ 517.644551] device loop0 blocksize: 4096 21:13:38 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00\x00\x00\x00\x00\x00\x00\x00\x88', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="2cfef251f3a7720be4ceb8b35854ca7a150baf81613265a7ebd2881c22046b9e582f7933575510234b04090bb7e338f5bd0498de4b3ae9bf673f749d52ee4aee9156b84e6e699c752dda53812d0268a54ed4be69ef8b8c7e31aba751f3e34537a32486da8907fbdc3fbeae0f890000000000000000005a926124b2fff5b9fdee0eeef022345ea8f6db04a4076c1d89e6f72c05758deba7df675db8c38a4f8bc5ae0cb99f34d88606aae2e5f45f596cfeda781357c017cd683b9d059d56581fc99fe25b6531a54fb90fe070aa0165cd22061184336b580e4d2b46d7f5b52af278d29f27dc90f14a7f4556742ed5dd569626c1290a42b58c3b7e641cf8898da1de364ffd827b2b590c9e1b18969c9ac24cf71af43563d44470e5fbcecb24855fe2fae20dde43e308b83ed0985020a68d3ca25341c6191b6613f8887a7bf8d93ace30ae9a9ecab4", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:38 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:38 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2008000) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000040)={0xd000, 0x104000}) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000000)={'gre0\x00'}) sendfile(r0, r2, 0x0, 0x800000000031) 21:13:38 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$VIDIOC_S_EDID(0xffffffffffffffff, 0xc0245629, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/52) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='new ecryptfs user: 0000000000000069\x00'], 0x28, 0x0) [ 518.229862] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 518.236310] b_state=0x00000029, b_size=512 [ 518.240548] device loop0 blocksize: 4096 [ 518.281829] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 518.288185] b_state=0x00000029, b_size=512 [ 518.292434] device loop0 blocksize: 4096 [ 518.298689] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 518.304946] b_state=0x00000029, b_size=512 [ 518.309186] device loop0 blocksize: 4096 [ 518.314145] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 518.320375] b_state=0x00000029, b_size=512 [ 518.324699] device loop0 blocksize: 4096 21:13:39 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) sendmsg(r1, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000000)="eaf1fb397471a07feed4d821faba9e74beafae056b6601fd3df81a70192b8e758bf9c52e68f3f316b44e146ff6b00aea0254959e7a4c50c680c8e698e43b9c4c07a2a429bd904faf28d581d5829bdcd163792fe491b03ee2ad854d942dbad463d83a2bcd9f7b155b4f26", 0x6a}, {&(0x7f0000000080)}, {&(0x7f0000000240)="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", 0x1000}, {&(0x7f00000000c0)="99bba1c3a820e6fa8b88654e8331bad0ac523ef1a58d8a6c14069345303e328c64235bc412bdaee1f54e5ba881c38319ec2d0340b261bb51fa7be8fc4cd17134eb6442163f44efc5f76d43976c30e468f8952c8426d07991b28d9a72fb59da07f7fc8d9b37c83c58eb165f10e704190a4f829fa5734c0d5bd79a6a86de83ae1afe8b3402718c9beb2dbc70d34184f43f072afe4a8441b317a4b4a847082bc757e5b466936f3e0454049b900d736ef0ea5d4b527dd7175445c6f9de330b203aabf8ee1de15a55c8c0313ce69d54a112", 0xcf}, {&(0x7f0000001240)="079a4e2f3a85dcdbd3ef17748929546f3853ed34f792fb43296d97038e324dfd87c5eb47574d771d4a01ea5e0c2a85400c44a4a8c5c6ad1e5050a2722b3d5f31f9743fdeb5e1900e314f1826a79ebbe7d53885fb751dea35ef94d8956c9da5f36b7e92b67f60cf262955709c54938af4290503dd1feebd00097b466d8382019d61ec4faf8f9662bca610c05b20c64695c8a09ef289cbc6893880cc205d89d42f79b290316b912fca0b8636b5b95161b9ac04d4236440bd85", 0xb8}, {&(0x7f0000001300)="cb8e1e72e4323ceaaa5ee48d879f569483b36400e00e8260e56aebbbc2f078cc68e3cc9a33f6faf5c0fe653fabe5c7ac2bf771ff7a64b21df210dfb07f508bb8d198b29b17433e38955781b4a84f540471aa5d36f98694136aef4597aa5cc9c29afe78a047f299c63ab538b6536346428a1906f195cb547ede09cea4d6c2549d2d1b65a8776d87c1479eeedb380bb6213bb4086241ac97ce13118065594e800fe1ba7b6edfa85325b2e127998fab085d5a7e59e232575f3f7a86f50808c6a2f3a078a102c2c7fe9ea9a722b5e0edd00bef3c1d3da261090d35aa1a1fc80a29417a2bcd1985876d2d285e9dd159ce69bfffadc2ad2ff48b", 0xf7}, {&(0x7f00000001c0)="60e08a738d4abacfa67e64f95f668f745ebc", 0x12}], 0x7, &(0x7f0000001480)=[{0x100, 0x13f, 0x80000001, "abfa2c643453da761d795634ebd2a670dbc927ce2dc23118ea7b9fbccccbc63647f39f20d7ff2b4de8791b052e0f66ec973ed019b5cad481853e257b90d9f8b0b28735430ad6c68194f940f165f589f1e32c06da62d7ca8fbad44660d7b5327577514413a36bd324cfc88209ce74d7d91354c659c8dd8908d02ac1d55f5733de51c16adcfac70998ed5c384866f4980b0eeba73395881c45dc6bc2fc430cec8ccc5769f843a796c8fd135309b00000cafde10f076ba76470554006318f42372c9c4f3716a0e7c2173a285017234fe918e7b5efbd0d69a24649d3c0eea6fe2b9d52b618ae8642ee9fe2860adf"}], 0x100}, 0x20008000) ftruncate(r1, 0x2008000) sendfile(r0, r1, 0x0, 0x800000000031) 21:13:39 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:39 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/52) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r3 = add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000200)="9ff524cdf859d2b3bafea56e2b91ce16733f0273668ed6f183b5226c2bf05d669933cf4f562a19d8", 0x28, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, 0x0) keyctl$instantiate(0xc, r3, &(0x7f0000000380)=ANY=[@ANYBLOB='new ecryptfs user: 0000000000000069\x00'], 0x28, 0x0) [ 518.580928] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 518.587240] b_state=0x00000029, b_size=512 [ 518.591484] device loop0 blocksize: 4096 [ 518.636187] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 518.642671] b_state=0x00000029, b_size=512 [ 518.646971] device loop0 blocksize: 4096 [ 518.656841] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 518.663303] b_state=0x00000029, b_size=512 [ 518.667604] device loop0 blocksize: 4096 [ 518.680512] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 518.686701] b_state=0x00000029, b_size=512 [ 518.691028] device loop0 blocksize: 4096 [ 518.695112] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 518.701359] b_state=0x00000029, b_size=512 [ 518.705601] device loop0 blocksize: 4096 [ 518.709758] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 518.715904] b_state=0x00000029, b_size=512 [ 518.720264] device loop0 blocksize: 4096 [ 518.724357] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 518.730582] b_state=0x00000029, b_size=512 [ 518.734819] device loop0 blocksize: 4096 [ 518.739008] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 518.745170] b_state=0x00000029, b_size=512 [ 518.749630] device loop0 blocksize: 4096 21:13:39 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 518.852924] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 518.859279] b_state=0x00000029, b_size=512 [ 518.863536] device loop0 blocksize: 4096 [ 518.868911] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 518.875110] b_state=0x00000029, b_size=512 [ 518.879428] device loop0 blocksize: 4096 [ 518.883593] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 518.890007] b_state=0x00000029, b_size=512 [ 518.894249] device loop0 blocksize: 4096 [ 518.944647] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 518.950975] b_state=0x00000029, b_size=512 [ 518.955214] device loop0 blocksize: 4096 [ 518.989375] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 518.995713] b_state=0x00000029, b_size=512 [ 519.000042] device loop0 blocksize: 4096 [ 519.004211] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 519.010461] b_state=0x00000029, b_size=512 [ 519.014699] device loop0 blocksize: 4096 [ 519.018832] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 519.025633] b_state=0x00000029, b_size=512 [ 519.029878] device loop0 blocksize: 4096 21:13:39 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) lgetxattr(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/164, 0xfffffffffffffdae) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2008000) sendfile(r0, r1, 0x0, 0x800000000031) [ 519.060302] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 519.066502] b_state=0x00000029, b_size=512 [ 519.070922] device loop0 blocksize: 4096 [ 519.172697] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 519.178892] b_state=0x00000029, b_size=512 [ 519.183242] device loop0 blocksize: 4096 [ 519.187456] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 519.193901] b_state=0x00000029, b_size=512 [ 519.198145] device loop0 blocksize: 4096 21:13:40 executing program 4: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00\x00\x00\x00\x00\x00\x00\x00\x11', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 519.225640] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 519.231992] b_state=0x00000029, b_size=512 [ 519.236232] device loop0 blocksize: 4096 [ 519.250825] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 519.257147] b_state=0x00000029, b_size=512 [ 519.261470] device loop0 blocksize: 4096 [ 519.274121] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 519.280688] b_state=0x00000029, b_size=512 [ 519.285197] device loop0 blocksize: 4096 [ 519.302387] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 519.308624] b_state=0x00000029, b_size=512 [ 519.313211] device loop0 blocksize: 4096 [ 519.490155] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 519.496450] b_state=0x00000029, b_size=512 [ 519.500694] device loop0 blocksize: 4096 [ 519.505060] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 519.511273] b_state=0x00000029, b_size=512 [ 519.515577] device loop0 blocksize: 4096 [ 519.520763] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 519.527221] b_state=0x00000029, b_size=512 [ 519.531464] device loop0 blocksize: 4096 [ 519.588979] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 519.595441] b_state=0x00000029, b_size=512 [ 519.599693] device loop0 blocksize: 4096 [ 519.605291] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 519.611461] b_state=0x00000029, b_size=512 [ 519.615769] device loop0 blocksize: 4096 [ 519.637832] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 519.644142] b_state=0x00000029, b_size=512 [ 519.648501] device loop0 blocksize: 4096 [ 519.693868] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 519.700178] b_state=0x00000029, b_size=512 [ 519.704420] device loop0 blocksize: 4096 [ 519.708799] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 519.714956] b_state=0x00000029, b_size=512 [ 519.719284] device loop0 blocksize: 4096 [ 519.723477] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 519.729723] b_state=0x00000029, b_size=512 [ 519.733968] device loop0 blocksize: 4096 21:13:40 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:40 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="0749323abe4387662d10b7cd76fa130304000000000000c3c7ca160a7b5d2d82068cfdbb81a6fbf8c375677ecbc21685bc57675b607ac350289ac120719ff229bf6da4e191bcee0837dfcaac0518917528ba1d590f46b5240322c1f97f5c4d8903d2dc0096c5bef6b74708000000cee3d90f6aeb04fa55ff1c31d57645f77192b91cdc62428ab2742c28c1f44b81c71e1041fe412e2568ec39b7bf23bc2bc6568121b0bccf91b3c021816f242e3363a32511b78693f810a75ff82452b3f05889945d412d6ab8d78342575ee059a44b0df78589a0d3d84206481b05d31a0b973f091b08aa4adb561b5c54dcd8cf27e71d58a007a3b2124db2fbf1fcfc1ad861d18691d5a45b2538e8bb8c222996a29fd8f0736e446608ad03d2ba05579c93370b5ccff3d63b3cf3f2cfdb4472be1e7d4a6438746f9862e0e31656f65f9c3f378d4223029e18b18ba886f171cba9bd226ecd8effd793cca2458600f093fa20eeed1a05f54006656856445ae6800c9b9b"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:40 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2008000) sendfile(r0, r1, 0x0, 0x800000000031) ftruncate(r0, 0x8) 21:13:40 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/52) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r3 = add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000200)="9ff524cdf859d2b3bafea56e2b91ce16733f0273668ed6f183b5226c2bf05d669933cf4f562a19d8", 0x28, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, 0x0) keyctl$instantiate(0xc, r3, &(0x7f0000000380)=ANY=[@ANYBLOB='new ecryptfs user: 0000000000000069\x00'], 0x28, 0x0) [ 519.745304] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 519.751670] b_state=0x00000029, b_size=512 [ 519.756092] device loop0 blocksize: 4096 [ 519.811252] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 519.817728] b_state=0x00000029, b_size=512 [ 519.822011] device loop0 blocksize: 4096 [ 519.846799] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 519.853078] b_state=0x00000029, b_size=512 [ 519.857502] device loop0 blocksize: 4096 [ 519.904216] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 519.910541] b_state=0x00000029, b_size=512 [ 519.914783] device loop0 blocksize: 4096 [ 519.921956] IPVS: sync thread started: state = MASTER, mcast_ifn = ip6tnl0, syncid = 2, id = 0 21:13:40 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000080)=""/65) syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2008000) sendfile(r0, r2, 0x0, 0x800000000031) [ 520.013468] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 520.019832] b_state=0x00000029, b_size=512 [ 520.024072] device loop0 blocksize: 4096 [ 520.032740] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 21:13:40 executing program 4: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="2cfef251f3a7720be4ceb8b35854ca7a150baf81613265a7ebd2881c22046b9e582f7933575510234b04090bb7e338f5bd0498de4b3ae9bf673f749d52ee4aee9156b84e6e699c752dda53812d0268a54ed4be69ef8b8c7e31aba751f3e34537a32486da8907fbdc3fbeae0f890000000000000000005a926124b2fff5b9fdee0eeef022345ea8f6db04a4076c1d89e6f72c05758deba7df675db8c38a4f8bc5ae0cb99f34d88606aae2e5f45f596cfeda781357c017cd683b9d059d56581fc99fe25b6531a54fb90fe070aa0165cd22061184336b580e4d2b46d7f5b52af278d29f27dc90f14a7f4556742ed5dd569626c1290a42b58c3b7e641cf8898da1de364ffd827b2b590c9e1b18969c9ac24cf71af43563d44470e5fbcecb24855fe2fae20dde43e308b83ed0985020a68d3ca25341c6191b6613f8887a7bf8d93ace30ae9a9ecab4", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:41 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:41 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, 0x0, &(0x7f0000000340)) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 520.453481] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 520.459945] b_state=0x00000029, b_size=512 [ 520.464256] device loop0 blocksize: 4096 21:13:41 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/52) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r3 = add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000200)="9ff524cdf859d2b3bafea56e2b91ce16733f0273668ed6f183b5226c2bf05d669933cf4f562a19d8", 0x28, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, 0x0) keyctl$instantiate(0xc, r3, &(0x7f0000000380)=ANY=[@ANYBLOB='new ecryptfs user: 0000000000000069\x00'], 0x28, 0x0) [ 520.593653] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 520.599998] b_state=0x00000029, b_size=512 [ 520.604320] device loop0 blocksize: 4096 [ 520.609182] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 520.615465] b_state=0x00000029, b_size=512 [ 520.619700] device loop0 blocksize: 4096 [ 520.624575] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 520.630885] b_state=0x00000029, b_size=512 [ 520.635402] device loop0 blocksize: 4096 [ 520.649336] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 520.655822] b_state=0x00000029, b_size=512 [ 520.660069] device loop0 blocksize: 4096 [ 520.666143] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 520.672373] b_state=0x00000029, b_size=512 [ 520.676736] device loop0 blocksize: 4096 [ 520.681063] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 520.687352] b_state=0x00000029, b_size=512 [ 520.691785] device loop0 blocksize: 4096 [ 520.705903] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 520.712174] b_state=0x00000029, b_size=512 [ 520.716535] device loop0 blocksize: 4096 [ 520.720769] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 520.727266] b_state=0x00000029, b_size=512 [ 520.731519] device loop0 blocksize: 4096 [ 520.739776] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 520.746080] b_state=0x00000029, b_size=512 [ 520.750330] device loop0 blocksize: 4096 [ 520.778840] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 520.785266] b_state=0x00000029, b_size=512 [ 520.789516] device loop0 blocksize: 4096 [ 520.793703] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 520.800241] b_state=0x00000029, b_size=512 [ 520.804480] device loop0 blocksize: 4096 [ 520.934211] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 520.940538] b_state=0x00000029, b_size=512 [ 520.944774] device loop0 blocksize: 4096 [ 520.979775] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 520.986025] b_state=0x00000029, b_size=512 [ 520.990434] device loop0 blocksize: 4096 [ 520.994632] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 521.001046] b_state=0x00000029, b_size=512 [ 521.005288] device loop0 blocksize: 4096 [ 521.015531] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 521.021881] b_state=0x00000029, b_size=512 [ 521.026122] device loop0 blocksize: 4096 21:13:41 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) prctl$PR_SVE_GET_VL(0x33, 0xd426) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2008000) sendfile(r0, r1, 0x0, 0x800000000031) [ 521.042522] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 521.048875] b_state=0x00000029, b_size=512 [ 521.053116] device loop0 blocksize: 4096 [ 521.057638] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 521.063851] b_state=0x00000029, b_size=512 [ 521.068172] device loop0 blocksize: 4096 [ 521.072350] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 521.078852] b_state=0x00000029, b_size=512 [ 521.083094] device loop0 blocksize: 4096 [ 521.191995] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 521.198332] b_state=0x00000029, b_size=512 [ 521.202574] device loop0 blocksize: 4096 [ 521.206771] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 521.213041] b_state=0x00000029, b_size=512 [ 521.217285] device loop0 blocksize: 4096 [ 521.227694] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 521.233962] b_state=0x00000029, b_size=512 [ 521.238199] device loop0 blocksize: 4096 21:13:42 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) ioctl$VIDIOC_S_EDID(0xffffffffffffffff, 0xc0245629, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000001c0)=""/52) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r2 = add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000200)="9ff524cdf859d2b3bafea56e2b91ce16733f0273668ed6f183b5226c2bf05d669933cf4f562a19d8", 0x28, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, 0x0) keyctl$instantiate(0xc, r2, &(0x7f0000000380)=ANY=[@ANYBLOB='new ecryptfs user: 0000000000000069\x00'], 0x28, 0x0) [ 521.242377] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 521.248755] b_state=0x00000029, b_size=512 [ 521.253109] device loop0 blocksize: 4096 [ 521.319476] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 521.325712] b_state=0x00000029, b_size=512 [ 521.330151] device loop0 blocksize: 4096 21:13:42 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200), &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 521.368952] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 521.375437] b_state=0x00000029, b_size=512 [ 521.379756] device loop0 blocksize: 4096 [ 521.383882] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 521.390237] b_state=0x00000029, b_size=512 [ 521.394491] device loop0 blocksize: 4096 21:13:42 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) ioctl$VIDIOC_ENUMAUDIO(r1, 0xc0345641, &(0x7f0000000000)={0x8, "5e5e2ec347b48726f28285179701a0a3f4fa636c0a6d45ccfdfa9d845f7b700d", 0x2, 0x1}) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x4) ftruncate(r2, 0x2008000) pwrite64(r1, &(0x7f0000000180)="de2ce90289013858dcf6ca", 0xb, 0x0) sendfile(r0, r2, 0x0, 0x800000000031) ioctl$VIDIOC_G_PARM(r1, 0xc0cc5615, &(0x7f0000000040)={0x2, @raw_data="172301cf22d630ce65b90e0d02aca374f1b5f631957bb2d54e180ec1a00d8a742a9805915e340bbc797a16dad10291154a47fff064b74e3097b9020a00f311ab55de40f9d03d54fb30ce093fcd25f27e6222bd7621b0656cd3d5a8a7de1b6573744f96c9b346524b8d4bbc53cbf73f8fdefbcee5b3f9437c9477d027040a6587c65e42e2bf4acadfd87ec84b007d857f850d78ed01c9e4a8ea4cacd383a240501c62a608a6e5a733124c952db7c22428a379edb081ca2a909b1c22225a937459b8c931f92b857a77"}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r1, 0x4010641a, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) [ 521.557178] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 521.563791] b_state=0x00000029, b_size=512 [ 521.568648] device loop0 blocksize: 4096 [ 521.585012] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 521.591391] b_state=0x00000029, b_size=512 [ 521.595631] device loop0 blocksize: 4096 [ 521.599913] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 521.606400] b_state=0x00000029, b_size=512 [ 521.610646] device loop0 blocksize: 4096 [ 521.897929] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 521.904459] b_state=0x00000029, b_size=512 [ 521.908702] device loop0 blocksize: 4096 [ 521.915649] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 521.922035] b_state=0x00000029, b_size=512 [ 521.926354] device loop0 blocksize: 4096 [ 521.930867] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 521.937144] b_state=0x00000029, b_size=512 [ 521.941382] device loop0 blocksize: 4096 [ 521.949504] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 521.955989] b_state=0x00000029, b_size=512 [ 521.960232] device loop0 blocksize: 4096 21:13:42 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:42 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, 0x0) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 522.202812] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 522.209344] b_state=0x00000029, b_size=512 [ 522.213593] device loop0 blocksize: 4096 21:13:43 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/52) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r3 = add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000200)="9ff524cdf859d2b3bafea56e2b91ce16733f0273668ed6f183b5226c2bf05d669933cf4f562a19d8", 0x28, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, 0x0) keyctl$instantiate(0xc, r3, &(0x7f0000000380)=ANY=[@ANYBLOB='new ecryptfs user: 0000000000000069\x00'], 0x28, 0x0) [ 522.454843] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 522.461108] b_state=0x00000029, b_size=512 [ 522.465352] device loop0 blocksize: 4096 21:13:43 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r8}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:43 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000200041003800000005000000dc1521b7a76720f76675c7930f227d013f089ecd5873637e1518bd847b2a450000aacd602a99ec218e032cc7cfd10898429eaca0cbfc831db1511a6e9f56f0245d577091cc43746f61ba60fa44e229187c3dbc38308e8b299ebf334a74599ecdd8028676f275a24423dc07858616f2a6fbd4f6b78e73c2063ea090e7d2fa1d822d60975e42d6e56992bdbcea5bf32923b8d5ed9395db31ab00"], &(0x7f0000000180)=""/90, 0xb0, 0x5a, 0xfffffffffffffffd}, 0x20) fadvise64(r0, 0x0, 0x40, 0x4) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x51, 0x6, 0x0, "553368628c61f90711c2ff2503dccdbd", "4cf8fe3393841a65ab96e6617dcc6f2e007af633b109a82e7b87e0e450cafbaabdd174e75c3c3db6ba75352c4365e4cc59d74cdac90b57eeaf76746b"}, 0x51, 0x2) r2 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2008000) fcntl$notify(r2, 0x402, 0x80000000) sendfile(r1, r3, 0x0, 0x800000000031) fcntl$addseals(r1, 0x409, 0x2) [ 522.510189] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 522.516472] b_state=0x00000029, b_size=512 [ 522.520967] device loop0 blocksize: 4096 [ 522.599531] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 522.606014] b_state=0x00000029, b_size=512 [ 522.610560] device loop0 blocksize: 4096 21:13:43 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) ioctl$VIDIOC_S_EDID(0xffffffffffffffff, 0xc0245629, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000001c0)=""/52) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r2 = add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000200)="9ff524cdf859d2b3bafea56e2b91ce16733f0273668ed6f183b5226c2bf05d669933cf4f562a19d8", 0x28, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, 0x0) keyctl$instantiate(0xc, r2, &(0x7f0000000380)=ANY=[@ANYBLOB='new ecryptfs user: 0000000000000069\x00'], 0x28, 0x0) [ 522.731643] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 522.737879] b_state=0x00000029, b_size=512 [ 522.742370] device loop0 blocksize: 4096 [ 522.798855] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 522.805121] b_state=0x00000029, b_size=512 [ 522.809374] device loop0 blocksize: 4096 21:13:43 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:43 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2008000) sendfile(r0, r1, 0x0, 0x800000000031) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000000)) [ 522.904939] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 522.911258] b_state=0x00000029, b_size=512 [ 522.915628] device loop0 blocksize: 4096 [ 522.942747] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 522.949207] b_state=0x00000029, b_size=512 [ 522.953721] device loop0 blocksize: 4096 [ 522.959448] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 522.965773] b_state=0x00000029, b_size=512 [ 522.970012] device loop0 blocksize: 4096 [ 522.974168] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 522.980318] b_state=0x00000029, b_size=512 [ 522.984621] device loop0 blocksize: 4096 [ 522.992912] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 522.999091] b_state=0x00000029, b_size=512 [ 523.003600] device loop0 blocksize: 4096 [ 523.020867] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 523.027293] b_state=0x00000029, b_size=512 [ 523.031544] device loop0 blocksize: 4096 [ 523.105114] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 523.111579] b_state=0x00000029, b_size=512 [ 523.115897] device loop0 blocksize: 4096 [ 523.138573] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 523.144931] b_state=0x00000029, b_size=512 [ 523.149169] device loop0 blocksize: 4096 [ 523.190604] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 523.197046] b_state=0x00000029, b_size=512 [ 523.201284] device loop0 blocksize: 4096 [ 523.221856] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 523.228206] b_state=0x00000029, b_size=512 [ 523.232447] device loop0 blocksize: 4096 [ 523.242019] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 523.248263] b_state=0x00000029, b_size=512 [ 523.252539] device loop0 blocksize: 4096 [ 523.269513] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 523.275804] b_state=0x00000029, b_size=512 [ 523.280041] device loop0 blocksize: 4096 [ 523.284562] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 523.291044] b_state=0x00000029, b_size=512 [ 523.295296] device loop0 blocksize: 4096 21:13:44 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) ioctl$VIDIOC_S_EDID(0xffffffffffffffff, 0xc0245629, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000001c0)=""/52) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r2 = add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000200)="9ff524cdf859d2b3bafea56e2b91ce16733f0273668ed6f183b5226c2bf05d669933cf4f562a19d8", 0x28, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, 0x0) keyctl$instantiate(0xc, r2, &(0x7f0000000380)=ANY=[@ANYBLOB='new ecryptfs user: 0000000000000069\x00'], 0x28, 0x0) 21:13:44 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, 0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 523.588636] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 523.616259] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 523.622686] b_state=0x00000029, b_size=512 [ 523.626928] device loop0 blocksize: 4096 [ 523.632330] __find_get_block_slow() failed. block=1, b_blocknr=8 21:13:44 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x7, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x23, &(0x7f0000000240)={@multicast1, @multicast2, 0x0}, &(0x7f0000000280)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000440)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a00)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000a40)={0x0, @initdev, @multicast1}, &(0x7f0000000a80)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000ac0)={'vcan0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000006280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000062c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000006300)={{{@in6, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000006400)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000006440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000006480)=0x14) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007940)={&(0x7f00000064c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000007840)=[{&(0x7f0000006540)=""/40, 0x28}, {&(0x7f0000006580)=""/189, 0xbd}, {&(0x7f0000006640)=""/212, 0xd4}, {&(0x7f0000006740)=""/4096, 0x1000}, {&(0x7f0000007740)=""/198, 0xc6}], 0x5, &(0x7f00000078c0)=""/106, 0x6a}, 0x60) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000007980)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000007a80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007ac0)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000007b00)={{{@in=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000007c00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007c40)={{{@in6=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000007d40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007d80)={{{@in=@broadcast, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000007e80)=0x8c) getpeername$packet(0xffffffffffffffff, &(0x7f0000008100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008140)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000081c0)={'team0\x00', 0x0}) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f00000082c0)={@empty, 0x0}, &(0x7f0000008300)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000008340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000008380)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000083c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000084c0)={'bond_slave_0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000008500)={@initdev, @initdev, 0x0}, &(0x7f0000008540)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000008580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000085c0)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000008600)={@local, 0x0}, &(0x7f0000008640)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x23, &(0x7f000000aac0)={@loopback, @dev, 0x0}, &(0x7f000000ab00)=0xc) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000ab40)={0x0, @initdev, @empty}, &(0x7f000000ab80)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f000000abc0)={@dev, @initdev, 0x0}, &(0x7f000000ac00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000adc0)={{{@in6=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f000000aec0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f000000af00)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f000000b000)=0xe8) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000bb00)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f000000bac0)={&(0x7f0000000b00)=ANY=[@ANYBLOB='L\n\x00\x00', @ANYRES16=r2, @ANYBLOB="000426bd7000fbdbdf250000000008000100", @ANYRES32=r3, @ANYBLOB="bc00020040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462616c616e63650040000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000001000040062726f61646361737400000038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000300000008000100", @ANYRES32=r4, @ANYBLOB="1802020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000200000008000600", @ANYRES32=r5, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e00000008000400f5bf000008000600", @ANYRES32=r6, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r7, @ANYBLOB="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", @ANYRES32=r8, @ANYBLOB="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", @ANYRES32=r9, @ANYBLOB="08000100", @ANYRES32=r10, @ANYBLOB="7400020038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400ca0000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r11, @ANYBLOB="08000100", @ANYRES32=r12, @ANYBLOB="58020200400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000100000008000600", @ANYRES32=r13, @ANYBLOB="40000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462616c616e63650040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r14, @ANYBLOB="080007000000000038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004001f00000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040020000000080007000000000038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000700000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400590000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r15, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000100000038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004007300000008000100", @ANYRES32=r16, @ANYBLOB="f800020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000200000008000600", @ANYRES32=r17, @ANYBLOB="3c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c00040068617368000000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r18, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r19, @ANYBLOB="08000100", @ANYRES32=r20, @ANYBLOB="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", @ANYRES32=r21, @ANYBLOB="08000100", @ANYRES32=r22, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000200000008000600", @ANYRES32=r23, @ANYBLOB="08000100", @ANYRES32=r24, @ANYBLOB="3c0002003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r25, @ANYBLOB="08000100", @ANYRES32=r26, @ANYBLOB="3c00020038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400ffff000008000100", @ANYRES32=r27, @ANYBLOB="3401020044000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001400040008000506feffffff060009010300000038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400ffff00003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r28, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r29, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32=r30], 0xa4c}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r31 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) setsockopt$inet6_group_source_req(r31, 0x29, 0x2f, &(0x7f0000000000)={0x7, {{0xa, 0x4e22, 0x8, @loopback, 0xbb}}, {{0xa, 0x4e20, 0x101, @loopback, 0x7f}}}, 0x108) ftruncate(r31, 0x2008000) sendfile(r0, r31, 0x0, 0x800000000031) [ 523.638602] b_state=0x00000029, b_size=512 [ 523.642843] device loop0 blocksize: 4096 [ 523.662141] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 523.668393] b_state=0x00000029, b_size=512 [ 523.672806] device loop0 blocksize: 4096 21:13:44 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e22, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x9}, @in6={0xa, 0x4e21, 0x1, @mcast2, 0xebd}], 0x38) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2008000) sendfile(r1, r1, 0x0, 0x800000000031) [ 523.718519] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 523.724961] b_state=0x00000029, b_size=512 [ 523.729275] device loop0 blocksize: 4096 21:13:44 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/52) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r3 = add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000200)="9ff524cdf859d2b3bafea56e2b91ce16733f0273668ed6f183b5226c2bf05d669933cf4f562a19d8", 0x28, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, 0x0) keyctl$instantiate(0xc, r3, &(0x7f0000000380)=ANY=[@ANYBLOB='new ecryptfs user: 0000000000000069\x00'], 0x28, 0x0) [ 523.788596] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 523.794906] b_state=0x00000029, b_size=512 [ 523.799152] device loop0 blocksize: 4096 [ 523.890437] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 523.896690] b_state=0x00000029, b_size=512 [ 523.901057] device loop0 blocksize: 4096 21:13:44 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 523.961650] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 523.968017] b_state=0x00000029, b_size=512 [ 523.972477] device loop0 blocksize: 4096 21:13:44 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2008000) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000000)=0x87, 0x4) sendfile(r0, r2, 0x0, 0x800000000031) [ 524.034852] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 524.041102] b_state=0x00000029, b_size=512 [ 524.045448] device loop0 blocksize: 4096 21:13:44 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x40) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000040)) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2008000) sendfile(r0, r2, 0x0, 0x800000000031) [ 524.125055] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 524.131431] b_state=0x00000029, b_size=512 [ 524.135808] device loop0 blocksize: 4096 21:13:45 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', 0x0, 0x0, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 524.295496] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 524.301731] b_state=0x00000029, b_size=512 [ 524.306357] device loop0 blocksize: 4096 21:13:45 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$VIDIOC_S_EDID(0xffffffffffffffff, 0xc0245629, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/52) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r3 = add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000200)="9ff524cdf859d2b3bafea56e2b91ce16733f0273668ed6f183b5226c2bf05d669933cf4f562a19d8", 0x28, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, 0x0) keyctl$instantiate(0xc, r3, &(0x7f0000000380)=ANY=[@ANYBLOB='new ecryptfs user: 0000000000000069\x00'], 0x28, 0x0) [ 524.337617] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 524.343888] b_state=0x00000029, b_size=512 [ 524.348213] device loop0 blocksize: 4096 [ 524.535858] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 524.542054] b_state=0x00000029, b_size=512 [ 524.546407] device loop0 blocksize: 4096 [ 524.550531] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 524.556766] b_state=0x00000029, b_size=512 [ 524.561002] device loop0 blocksize: 4096 [ 524.565594] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 524.572000] b_state=0x00000029, b_size=512 [ 524.576445] device loop0 blocksize: 4096 [ 524.587250] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 524.593660] b_state=0x00000029, b_size=512 [ 524.597970] device loop0 blocksize: 4096 [ 524.633067] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 524.639404] b_state=0x00000029, b_size=512 [ 524.643650] device loop0 blocksize: 4096 [ 524.693906] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 524.700208] b_state=0x00000029, b_size=512 [ 524.704444] device loop0 blocksize: 4096 [ 524.708739] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 524.714952] b_state=0x00000029, b_size=512 [ 524.719463] device loop0 blocksize: 4096 [ 524.760038] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 524.766351] b_state=0x00000029, b_size=512 [ 524.770662] device loop0 blocksize: 4096 21:13:45 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 524.881188] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 524.887517] b_state=0x00000029, b_size=512 [ 524.892008] device loop0 blocksize: 4096 [ 524.925391] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 524.931720] b_state=0x00000029, b_size=512 [ 524.935958] device loop0 blocksize: 4096 [ 525.016211] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 525.022867] b_state=0x00000029, b_size=512 [ 525.027110] device loop0 blocksize: 4096 [ 525.041773] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 525.048197] b_state=0x00000029, b_size=512 [ 525.052748] device loop0 blocksize: 4096 [ 525.059038] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 525.065403] b_state=0x00000029, b_size=512 [ 525.069643] device loop0 blocksize: 4096 [ 525.074015] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 525.080310] b_state=0x00000029, b_size=512 [ 525.084558] device loop0 blocksize: 4096 [ 525.088886] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 525.095230] b_state=0x00000029, b_size=512 [ 525.099470] device loop0 blocksize: 4096 [ 525.104075] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 525.110478] b_state=0x00000029, b_size=512 [ 525.114719] device loop0 blocksize: 4096 [ 525.132114] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 525.138327] b_state=0x00000029, b_size=512 [ 525.142680] device loop0 blocksize: 4096 [ 525.146941] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 525.153178] b_state=0x00000029, b_size=512 [ 525.157415] device loop0 blocksize: 4096 [ 525.161776] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 525.167932] b_state=0x00000029, b_size=512 [ 525.172251] device loop0 blocksize: 4096 [ 525.176516] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 525.182996] b_state=0x00000029, b_size=512 [ 525.187238] device loop0 blocksize: 4096 [ 525.196064] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 525.202337] b_state=0x00000029, b_size=512 [ 525.206581] device loop0 blocksize: 4096 [ 525.210749] __find_get_block_slow() failed. block=1, b_blocknr=8 21:13:46 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/52) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000200)="9ff524cdf859d2b3bafea56e2b91ce16733f0273668ed6f183b5226c2bf05d669933cf4f562a19d8", 0x28, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, 0x0) 21:13:46 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[], 0x0, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 525.216968] b_state=0x00000029, b_size=512 [ 525.221204] device loop0 blocksize: 4096 [ 525.225373] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 525.231565] b_state=0x00000029, b_size=512 [ 525.235801] device loop0 blocksize: 4096 [ 525.242454] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 525.248630] b_state=0x00000029, b_size=512 [ 525.253058] device loop0 blocksize: 4096 21:13:46 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x4000000000008b, 0x200000) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2008000) sendfile(r0, r1, 0x0, 0x800000000031) [ 525.266632] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 525.272917] b_state=0x00000029, b_size=512 [ 525.277183] device loop0 blocksize: 4096 [ 525.282317] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 525.288874] b_state=0x00000029, b_size=512 [ 525.293435] device loop0 blocksize: 4096 [ 525.298212] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 525.304733] b_state=0x00000029, b_size=512 [ 525.309095] device loop0 blocksize: 4096 21:13:46 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2008000) sendfile(r0, r1, 0x0, 0x800000000031) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)) [ 525.315025] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 525.321384] b_state=0x00000029, b_size=512 [ 525.325793] device loop0 blocksize: 4096 [ 525.353750] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 525.360241] b_state=0x00000029, b_size=512 [ 525.364640] device loop0 blocksize: 4096 [ 525.452559] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 525.458881] b_state=0x00000029, b_size=512 [ 525.463315] device loop0 blocksize: 4096 [ 525.504083] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 525.510340] b_state=0x00000029, b_size=512 [ 525.514661] device loop0 blocksize: 4096 [ 525.541988] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 525.548329] b_state=0x00000029, b_size=512 [ 525.552577] device loop0 blocksize: 4096 21:13:46 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$VIDIOC_S_EDID(0xffffffffffffffff, 0xc0245629, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/52) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r3 = add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000200)="9ff524cdf859d2b3bafea56e2b91ce16733f0273668ed6f183b5226c2bf05d669933cf4f562a19d8", 0x28, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, 0x0) keyctl$instantiate(0xc, r3, &(0x7f0000000380)=ANY=[@ANYBLOB='new ecryptfs user: 0000000000000069\x00'], 0x28, 0x0) 21:13:46 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x436580, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f00000000c0)={0x1, 0xfffffffffffffffb, 0x6}) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2001f, 0x200) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141043, 0x0) ftruncate(r3, 0x2008000) sendfile(r2, r2, 0x0, 0x800000000031) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f00000001c0)={'broute\x00'}, &(0x7f0000000240)=0x78) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x111502, 0x0) [ 525.597920] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 525.604374] b_state=0x00000029, b_size=512 [ 525.608790] device loop0 blocksize: 4096 [ 525.635499] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 525.641855] b_state=0x00000029, b_size=512 [ 525.646174] device loop0 blocksize: 4096 [ 525.650909] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 525.657474] b_state=0x00000029, b_size=512 [ 525.661721] device loop0 blocksize: 4096 [ 525.718351] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 525.724613] b_state=0x00000029, b_size=512 [ 525.729072] device loop0 blocksize: 4096 21:13:46 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:46 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/52) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000200)="9ff524cdf859d2b3bafea56e2b91ce16733f0273668ed6f183b5226c2bf05d669933cf4f562a19d8", 0x28, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, 0x0) [ 525.774533] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 525.780833] b_state=0x00000029, b_size=512 [ 525.785078] device loop0 blocksize: 4096 [ 525.789275] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 525.795427] b_state=0x00000029, b_size=512 [ 525.799898] device loop0 blocksize: 4096 21:13:46 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$VIDIOC_S_EDID(0xffffffffffffffff, 0xc0245629, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/52) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r3 = add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000200)="9ff524cdf859d2b3bafea56e2b91ce16733f0273668ed6f183b5226c2bf05d669933cf4f562a19d8", 0x28, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, 0x0) keyctl$instantiate(0xc, r3, &(0x7f0000000380)=ANY=[@ANYBLOB='new ecryptfs user: 0000000000000069\x00'], 0x28, 0x0) 21:13:46 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2008000) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000000)={'irlan0\x00'}) sendfile(r0, r1, 0x0, 0x800000000031) 21:13:46 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 526.094216] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 526.100494] b_state=0x00000029, b_size=512 [ 526.104735] device loop0 blocksize: 4096 [ 526.164770] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 526.171130] b_state=0x00000029, b_size=512 [ 526.175391] device loop0 blocksize: 4096 [ 526.183230] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 526.189520] b_state=0x00000029, b_size=512 [ 526.193755] device loop0 blocksize: 4096 [ 526.199646] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 526.205858] b_state=0x00000029, b_size=512 [ 526.210186] device loop0 blocksize: 4096 [ 526.215569] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 526.222078] b_state=0x00000029, b_size=512 [ 526.226315] device loop0 blocksize: 4096 [ 526.402283] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 526.408522] b_state=0x00000029, b_size=512 [ 526.412855] device loop0 blocksize: 4096 [ 526.431273] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 526.437567] b_state=0x00000029, b_size=512 [ 526.441866] device loop0 blocksize: 4096 [ 526.470258] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 526.477062] b_state=0x00000029, b_size=512 [ 526.481329] device loop0 blocksize: 4096 [ 526.486162] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 526.492982] b_state=0x00000029, b_size=512 [ 526.497235] device loop0 blocksize: 4096 [ 526.509366] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 526.515959] b_state=0x00000029, b_size=512 21:13:47 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$VIDIOC_S_EDID(0xffffffffffffffff, 0xc0245629, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/52) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r3 = add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000200)="9ff524cdf859d2b3bafea56e2b91ce16733f0273668ed6f183b5226c2bf05d669933cf4f562a19d8", 0x28, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, 0x0) keyctl$instantiate(0xc, r3, &(0x7f0000000380)=ANY=[@ANYBLOB='new ecryptfs user: 0000000000000069\x00'], 0x28, 0x0) [ 526.520623] device loop0 blocksize: 4096 [ 526.532926] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 526.539286] b_state=0x00000029, b_size=512 [ 526.543600] device loop0 blocksize: 4096 [ 526.560808] __find_get_block_slow() failed. block=1, b_blocknr=8 21:13:47 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="0749323abe4387662d10b7cd76fa130304000000000000c3c7ca160a7b5d2d82068cfdbb81a6fbf8c375677ecbc21685bc57675b607ac350289ac120719ff229bf6da4e191bcee0837dfcaac0518917528ba1d590f46b5240322c1f97f5c4d8903d2dc0096c5bef6b74708000000cee3d90f6aeb04fa55ff1c31d57645f77192b91cdc62428ab2742c28c1f44b81c71e1041fe412e2568ec39b7bf23bc2bc6568121b0bccf91b3c021816f242e3363a32511b78693f810a7"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="2cfef251f3a7720be4ceb8b35854ca7a150baf81613265a7ebd2881c22046b9e582f7933575510234b04090bb7e338f5bd0498de4b3ae9bf673f749d52ee4aee9156b84e6e699c752dda53812d0268a54ed4be69ef8b8c7e31aba751f3e34537a32486da8907fbdc3fbeae0f890000000000000000005a926124b2fff5b9fdee0eeef022345ea8f6db04a4076c1d89e6f72c05758deba7df675db8c38a4f8bc5ae0cb99f34d88606aae2e5f45f596cfeda781357c017cd683b9d059d56581fc99fe25b6531a54fb90fe070aa0165cd22061184336b580e4d2b46d7f5b52af278d29f27dc90f14a7f4556742ed5dd569626c1290a42b58c3b7e641cf8898da1de364ffd827b2b590c9e1b18969c9ac24cf71af43563d44470e5fbcecb24855fe2fae20dde43e308b83ed0985020a68d3ca25341c6191b6613f8887a7bf8d93ace30ae9a9ecab4", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 526.567596] b_state=0x00000029, b_size=512 [ 526.571850] device loop0 blocksize: 4096 21:13:47 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) tee(r0, r0, 0x7, 0x8) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000300)={0x0, 0xfffffffffffffff8, 0x20}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={r2, 0x100000000}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000100)={r3, @in6={{0xa, 0x4e21, 0x3, @loopback, 0x9f7a}}, [0x0, 0x3c, 0xbecc, 0x5, 0x10000, 0x800, 0xfffffffffffff52e, 0x10000, 0x7, 0x7f, 0x5, 0x0, 0x1ff, 0x100000000, 0x100]}, &(0x7f0000000240)=0x100) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x4) ftruncate(r4, 0x2008000) sendfile(r0, r4, 0x0, 0x800000000031) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x1, 0x4, 0x9, 0xfffffffffffffeff, 0x0, 0x5, 0x80, 0x0, 0x3, 0x100, 0x5, 0xd111, 0x3, 0x4, 0x4, 0x1, 0x5, 0x332, 0xa1, 0x6, 0x8, 0x4, 0x401, 0x4, 0x0, 0x3, 0x1, 0x7, 0x80000001, 0x100000000, 0x100, 0x8, 0x4c7, 0x101, 0xffff, 0x5, 0x0, 0x3, 0x0, @perf_config_ext={0x4, 0x1}, 0x20, 0xff, 0x281b2e3, 0x9, 0x3f, 0x9, 0x4}, 0x0, 0x10, r1, 0x0) 21:13:47 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00', 0xa}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 526.792585] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 526.814893] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 526.821198] b_state=0x00000029, b_size=512 [ 526.825539] device loop0 blocksize: 4096 [ 526.833424] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 526.840150] b_state=0x00000029, b_size=512 [ 526.844403] device loop0 blocksize: 4096 [ 526.894187] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 526.900674] b_state=0x00000029, b_size=512 [ 526.904916] device loop0 blocksize: 4096 21:13:47 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x800, 0x101) ftruncate(r1, 0x2008000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x202802, 0x0) sendfile(r0, r1, 0x0, 0x800000000031) [ 526.990035] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 526.996616] b_state=0x00000029, b_size=512 [ 527.000856] device loop0 blocksize: 4096 [ 527.018580] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 527.024985] b_state=0x00000029, b_size=512 [ 527.029304] device loop0 blocksize: 4096 21:13:47 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$VIDIOC_S_EDID(0xffffffffffffffff, 0xc0245629, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/52) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r3 = add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000200)="9ff524cdf859d2b3bafea56e2b91ce16733f0273668ed6f183b5226c2bf05d669933cf4f562a19d8", 0x28, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, 0x0) keyctl$instantiate(0xc, r3, &(0x7f0000000380)=ANY=[@ANYBLOB='new ecryptfs user: 0000000000000069\x00'], 0x28, 0x0) [ 527.070813] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 527.077130] b_state=0x00000029, b_size=512 [ 527.081381] device loop0 blocksize: 4096 [ 527.087506] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 527.093668] b_state=0x00000029, b_size=512 [ 527.097998] device loop0 blocksize: 4096 [ 527.102084] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 527.108292] b_state=0x00000029, b_size=512 [ 527.112529] device loop0 blocksize: 4096 [ 527.116606] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 527.123049] b_state=0x00000029, b_size=512 [ 527.127358] device loop0 blocksize: 4096 [ 527.133178] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 527.139582] b_state=0x00000029, b_size=512 [ 527.143861] device loop0 blocksize: 4096 [ 527.152185] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 527.158566] b_state=0x00000029, b_size=512 [ 527.162803] device loop0 blocksize: 4096 [ 527.167225] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 527.173481] b_state=0x00000029, b_size=512 [ 527.177784] device loop0 blocksize: 4096 [ 527.182048] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 527.188357] b_state=0x00000029, b_size=512 [ 527.192594] device loop0 blocksize: 4096 [ 527.198600] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 527.204791] b_state=0x00000029, b_size=512 [ 527.209090] device loop0 blocksize: 4096 21:13:48 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/52) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r3 = add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000200)="9ff524cdf859d2b3bafea56e2b91ce16733f0273668ed6f183b5226c2bf05d669933cf4f562a19d8", 0x28, 0x0) keyctl$instantiate(0xc, r3, &(0x7f0000000380)=ANY=[@ANYBLOB='new ecryptfs user: 0000000000000069\x00'], 0x28, 0x0) 21:13:48 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 527.242791] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 527.249062] b_state=0x00000029, b_size=512 [ 527.253297] device loop0 blocksize: 4096 21:13:48 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2008000) sendfile(r0, r1, 0x0, 0x800000000031) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000040)=0x10) 21:13:48 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2008000) sendfile(r0, r1, 0x0, 0x800000000031) [ 527.399154] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 527.405557] b_state=0x00000029, b_size=512 [ 527.409850] device loop0 blocksize: 4096 [ 527.478554] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 527.484831] b_state=0x00000029, b_size=512 [ 527.489071] device loop0 blocksize: 4096 21:13:48 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00', 0x2}, 0x44) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 527.551359] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 527.557720] b_state=0x00000029, b_size=512 [ 527.562055] device loop0 blocksize: 4096 [ 527.651505] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 527.657856] b_state=0x00000029, b_size=512 [ 527.662189] device loop0 blocksize: 4096 [ 527.670005] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 527.676273] b_state=0x00000029, b_size=512 [ 527.680511] device loop0 blocksize: 4096 [ 527.694512] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 527.700847] b_state=0x00000029, b_size=512 [ 527.705370] device loop0 blocksize: 4096 [ 527.713078] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 527.719285] b_state=0x00000029, b_size=512 [ 527.723601] device loop0 blocksize: 4096 [ 527.727746] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 527.733980] b_state=0x00000029, b_size=512 [ 527.738213] device loop0 blocksize: 4096 [ 527.742491] __find_get_block_slow() failed. block=1, b_blocknr=8 21:13:48 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/52) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r3 = add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000200)="9ff524cdf859d2b3bafea56e2b91ce16733f0273668ed6f183b5226c2bf05d669933cf4f562a19d8", 0x28, 0x0) keyctl$instantiate(0xc, r3, &(0x7f0000000380)=ANY=[@ANYBLOB='new ecryptfs user: 0000000000000069\x00'], 0x28, 0x0) 21:13:48 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="0749323abe4387662d10b7cd76fa130304000000000000c3c7ca160a7b5d2d82068cfdbb81a6fbf8c375677ecbc21685bc57675b607ac350289ac120719ff229bf6da4e191bcee0837dfcaac0518917528ba1d590f46b5240322c1f97f5c4d8903d2dc0096c5bef6b74708000000cee3d90f6aeb04fa55ff1c31d57645f77192b91cdc62428ab2742c28c1f44b81c71e1041fe412e2568ec39b7bf23bc2bc6568121b0bccf91b3c021816f242e3363a32511b78693f810a75ff82452b3f05889945d412d6ab8d78342575ee059a44b0df78589a0d3d84206481b05d31a0b973f091b08aa4adb561b5c54dcd8cf27e71d58a007a3b2124db2fbf1fcfc1ad861d18691d5a45b2538e8bb8c222996a29fd8f0736e446608ad03d2ba05579c93370b5ccff3d63b3cf3f2cfdb4472be1e7d4a6438746f9862e0e31656f65f9c3f378d4223"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 527.748697] b_state=0x00000029, b_size=512 [ 527.753299] device loop0 blocksize: 4096 [ 527.760874] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 527.767142] b_state=0x00000029, b_size=512 [ 527.771381] device loop0 blocksize: 4096 [ 527.857990] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 527.864291] b_state=0x00000029, b_size=512 [ 527.868532] device loop0 blocksize: 4096 [ 527.874245] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 527.880442] b_state=0x00000029, b_size=512 [ 527.884754] device loop0 blocksize: 4096 [ 527.909108] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 527.915604] b_state=0x00000029, b_size=512 [ 527.919865] device loop0 blocksize: 4096 [ 528.008821] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 528.015089] b_state=0x00000029, b_size=512 [ 528.019330] device loop0 blocksize: 4096 [ 528.023478] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 528.029772] b_state=0x00000029, b_size=512 [ 528.034021] device loop0 blocksize: 4096 [ 528.050754] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 528.057301] b_state=0x00000029, b_size=512 [ 528.061539] device loop0 blocksize: 4096 [ 528.138042] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 528.144237] b_state=0x00000029, b_size=512 [ 528.148580] device loop0 blocksize: 4096 [ 528.152800] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 528.159026] b_state=0x00000029, b_size=512 [ 528.163260] device loop0 blocksize: 4096 [ 528.167592] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 528.173746] b_state=0x00000029, b_size=512 [ 528.178328] device loop0 blocksize: 4096 [ 528.194757] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 528.201275] b_state=0x00000029, b_size=512 [ 528.205512] device loop0 blocksize: 4096 [ 528.216382] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 528.222614] b_state=0x00000029, b_size=512 [ 528.226948] device loop0 blocksize: 4096 [ 528.231275] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 528.237529] b_state=0x00000029, b_size=512 [ 528.241769] device loop0 blocksize: 4096 [ 528.245963] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 528.252476] b_state=0x00000029, b_size=512 [ 528.256758] device loop0 blocksize: 4096 21:13:49 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$VIDIOC_S_EDID(0xffffffffffffffff, 0xc0245629, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/52) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r3 = add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000200)="9ff524cdf859d2b3bafea56e2b91ce16733f0273668ed6f183b5226c2bf05d669933cf4f562a19d8", 0x28, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, 0x0) keyctl$instantiate(0xc, r3, &(0x7f0000000380)=ANY=[@ANYBLOB='new ecryptfs user: 0000000000000069\x00'], 0x28, 0x0) [ 528.342439] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 528.348802] b_state=0x00000029, b_size=512 [ 528.353042] device loop0 blocksize: 4096 [ 528.446662] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 528.452976] b_state=0x00000029, b_size=512 [ 528.457218] device loop0 blocksize: 4096 [ 528.474414] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 528.480783] b_state=0x00000029, b_size=512 [ 528.485032] device loop0 blocksize: 4096 21:13:49 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:49 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2008000) sendfile(r0, r2, 0x0, 0x800000000031) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000000)) 21:13:49 executing program 2: r0 = socket$inet6(0xa, 0x3ffffffffffe, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) connect$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0xffffffff, @my=0x0}, 0x10) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0xfffffffffffffffc) ftruncate(r3, 0x2008000) sendfile(r0, r3, 0x0, 0x800000000031) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000080)) [ 528.534366] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 528.540633] b_state=0x00000029, b_size=512 [ 528.544882] device loop0 blocksize: 4096 [ 528.648439] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 528.654878] b_state=0x00000029, b_size=512 [ 528.659131] device loop0 blocksize: 4096 [ 528.759181] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 528.765640] b_state=0x00000029, b_size=512 [ 528.769895] device loop0 blocksize: 4096 21:13:49 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00', 0x2}, 0x200000d8) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 528.874701] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 528.880922] b_state=0x00000029, b_size=512 [ 528.885422] device loop0 blocksize: 4096 [ 528.928175] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 528.934645] b_state=0x00000029, b_size=512 [ 528.938892] device loop0 blocksize: 4096 21:13:49 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8f, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r2, 0x0, 0x800000000031) 21:13:49 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x0, 0x10}, 0xc) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/52) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='new ecryptfs user: 0000000000000069\x00'], 0x28, 0x0) [ 529.017594] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 529.023857] b_state=0x00000029, b_size=512 [ 529.028277] device loop0 blocksize: 4096 [ 529.033217] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 529.039375] b_state=0x00000029, b_size=512 [ 529.043677] device loop0 blocksize: 4096 [ 529.048332] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 529.054737] b_state=0x00000029, b_size=512 [ 529.058975] device loop0 blocksize: 4096 [ 529.169059] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 529.175551] b_state=0x00000029, b_size=512 [ 529.179788] device loop0 blocksize: 4096 [ 529.257457] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 529.263707] b_state=0x00000029, b_size=512 [ 529.268312] device loop0 blocksize: 4096 [ 529.285261] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 529.291485] b_state=0x00000029, b_size=512 [ 529.296034] device loop0 blocksize: 4096 [ 529.313400] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 529.319942] b_state=0x00000029, b_size=512 [ 529.324191] device loop0 blocksize: 4096 [ 529.338610] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 529.344962] b_state=0x00000029, b_size=512 [ 529.349266] device loop0 blocksize: 4096 [ 529.357780] __find_get_block_slow() failed. block=1, b_blocknr=8 21:13:50 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="0749323abe4387662d10b7cd76fa130304000000000000c3c7ca160a7b5d2d82068cfdbb81a6fbf8c375677ecbc21685bc57675b607ac350289ac120719ff229bf6da4e191bcee0837dfcaac0518917528ba1d590f46b5240322c1f97f5c4d8903d2dc0096c5bef6b74708000000cee3d90f6aeb04fa55ff1c31d57645f77192b91cdc62428ab2742c28c1f44b81c71e1041fe412e2568ec39b7bf23bc2bc6568121b0bccf91b3c021816f242e3363a32511b78693f810a75ff82452b3f05889945d412d6ab8d78342575ee059a44b0df78589a0d3d84206481b05d31a0b973f091b08aa4adb561b5c54dcd8cf27e71d58a007a3b2124db2fbf1fcfc1ad861d18691d5a45b2538e8bb8c222996a29fd8f0736e446608ad03d2ba05579c93370b5ccff3d63b3cf3f2cfdb4472be1e7d4a6438746f9862e0e31656f65f9c3f378d4223029e18b18ba886f171cba9bd226ecd8effd793cca2458600f093fa20eeed1a05f540"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) 21:13:50 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2008000) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000000)=r2) sendfile(r0, r2, 0x0, 0x800000000031) [ 529.364153] b_state=0x00000029, b_size=512 [ 529.368451] device loop0 blocksize: 4096 [ 529.373133] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 529.379419] b_state=0x00000029, b_size=512 [ 529.383661] device loop0 blocksize: 4096 [ 529.393251] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 529.399609] b_state=0x00000029, b_size=512 [ 529.403848] device loop0 blocksize: 4096 [ 529.477151] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 529.483353] b_state=0x00000029, b_size=512 [ 529.487765] device loop0 blocksize: 4096 [ 529.491852] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 529.498099] b_state=0x00000029, b_size=512 [ 529.502344] device loop0 blocksize: 4096 [ 529.506696] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 529.512973] b_state=0x00000029, b_size=512 [ 529.517286] device loop0 blocksize: 4096 [ 529.527049] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 529.533533] b_state=0x00000029, b_size=512 [ 529.537831] device loop0 blocksize: 4096 21:13:50 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000240)=0x78) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$VIDIOC_S_EDID(0xffffffffffffffff, 0xc0245629, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000001c0)=""/52) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r3 = add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000200)="9ff524cdf859d2b3bafea56e2b91ce16733f0273668ed6f183b5226c2bf05d669933cf4f562a19d8", 0x28, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, 0x0) keyctl$instantiate(0xc, r3, &(0x7f0000000380)=ANY=[@ANYBLOB='new ecryptfs user: 0000000000000069\x00'], 0x28, 0x0) [ 529.697913] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 529.704219] b_state=0x00000029, b_size=512 [ 529.708455] device loop0 blocksize: 4096 [ 529.712742] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 529.718968] b_state=0x00000029, b_size=512 [ 529.723202] device loop0 blocksize: 4096 [ 529.727822] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 529.734127] b_state=0x00000029, b_size=512 [ 529.738374] device loop0 blocksize: 4096 [ 529.778199] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 529.784523] b_state=0x00000029, b_size=512 [ 529.788762] device loop0 blocksize: 4096 [ 529.796126] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 529.802441] b_state=0x00000029, b_size=512 [ 529.806681] device loop0 blocksize: 4096 [ 529.813833] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 529.820288] b_state=0x00000029, b_size=512 [ 529.824531] device loop0 blocksize: 4096 [ 529.828698] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 529.835105] b_state=0x00000029, b_size=512 [ 529.839356] device loop0 blocksize: 4096 21:13:50 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 529.919952] kworker/u4:1(21): getblk(): executed=9 bh_count=0 bh_state=0 [ 529.926929] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 529.933198] b_state=0x00000029, b_size=512 [ 529.937436] device loop0 blocksize: 4096 [ 529.943870] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 529.950257] b_state=0x00000029, b_size=512 [ 529.954561] device loop0 blocksize: 4096 [ 529.959459] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 529.965889] b_state=0x00000029, b_size=512 21:13:50 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffffcd) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x7}, 0x10) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000400)=""/163) write$FUSE_STATFS(r1, &(0x7f00000007c0)={0x60, 0xfffffffffffffffe, 0x6, {{0x9, 0x1ff, 0x3, 0x4, 0x6, 0x3, 0x81, 0x100000000}}}, 0x60) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/146, 0x92}], 0x1, &(0x7f0000000680)=""/113, 0x71, 0x1ff}, 0x8}], 0x1, 0x103, &(0x7f0000000780)={r5, r6+30000000}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'ip6tnl0\x00', 0x2}, 0x18) getsockname(r4, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000540)=0x80) r7 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000380)={0x0, 0xa9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r9}, &(0x7f0000000340)=0xff34) fsetxattr$security_ima(r8, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x3) ftruncate(r7, 0x8007ffc) sendfile(r2, r7, 0x0, 0x45a3) writev(r3, &(0x7f0000000840)=[{&(0x7f0000000880)="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", 0x146}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000001c0), 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) read(r1, &(0x7f0000000000)=""/253, 0xfd) [ 529.970130] device loop0 blocksize: 4096 [ 529.975513] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 529.981802] b_state=0x00000029, b_size=512 [ 529.986041] device loop0 blocksize: 4096 [ 529.995101] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 530.001383] b_state=0x00000029, b_size=512 [ 530.005623] device loop0 blocksize: 4096 [ 530.012462] __find_get_block_slow() failed. block=1, b_blocknr=8 21:13:50 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8e, 0x4000) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2008000) sendfile(r0, r1, 0x0, 0x800000000031) [ 530.018837] b_state=0x00000029, b_size=512 [ 530.023182] device loop0 blocksize: 4096 [ 530.027376] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 530.033596] b_state=0x00000029, b_size=512 [ 530.037833] device loop0 blocksize: 4096 [ 530.045111] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 530.051397] b_state=0x00000029, b_size=512 [ 530.055766] device loop0 blocksize: 4096 [ 530.061311] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 530.067565] b_state=0x00000029, b_size=512 [ 530.071866] device loop0 blocksize: 4096 [ 530.081789] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 530.088079] b_state=0x00000029, b_size=512 [ 530.092364] device loop0 blocksize: 4096 [ 530.108394] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 530.114731] b_state=0x00000029, b_size=512 [ 530.118971] device loop0 blocksize: 4096 [ 530.134632] INFO: task syz-executor0:16774 blocked for more than 140 seconds. [ 530.192978] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 530.199338] b_state=0x00000029, b_size=512 [ 530.203724] device loop0 blocksize: 4096 [ 530.215407] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 530.221690] b_state=0x00000029, b_size=512 [ 530.225992] device loop0 blocksize: 4096 [ 530.238805] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 530.245111] b_state=0x00000029, b_size=512 [ 530.249366] device loop0 blocksize: 4096 [ 530.263763] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 530.269983] b_state=0x00000029, b_size=512 [ 530.274303] device loop0 blocksize: 4096 [ 530.281354] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 530.287613] b_state=0x00000029, b_size=512 [ 530.291855] device loop0 blocksize: 4096 [ 530.298705] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 530.304969] b_state=0x00000029, b_size=512 [ 530.309202] device loop0 blocksize: 4096 [ 530.317919] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 530.324403] b_state=0x00000029, b_size=512 [ 530.328642] device loop0 blocksize: 4096 [ 530.332885] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 530.339280] b_state=0x00000029, b_size=512 [ 530.343517] device loop0 blocksize: 4096 [ 530.414073] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 530.420380] b_state=0x00000029, b_size=512 [ 530.424709] device loop0 blocksize: 4096 [ 530.431267] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 530.437525] b_state=0x00000029, b_size=512 [ 530.441762] device loop0 blocksize: 4096 [ 530.444859] kobject: 'loop5' (000000009be07530): kobject_uevent_env [ 530.452502] kobject: 'loop5' (000000009be07530): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 530.596922] Not tainted 4.20.0-rc7-next-20181224 #188 [ 530.617486] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. 21:13:51 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2008000) sendfile(r0, r1, 0x0, 0x800000000031) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) [ 530.686358] kobject: 'loop0' (0000000099f4facd): kobject_uevent_env [ 530.708953] syz-executor0 D20064 16774 8046 0x80000006 [ 530.715559] Call Trace: [ 530.728159] __schedule+0x9de/0x1ed0 [ 530.739500] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 530.745880] b_state=0x00000029, b_size=512 [ 530.749957] kobject: 'loop0' (0000000099f4facd): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 530.750222] device loop0 blocksize: 4096 [ 530.765827] ? __sched_text_start+0x8/0x8 [ 530.772724] ? graph_lock+0x270/0x270 [ 530.788090] ? print_usage_bug+0xc0/0xc0 [ 530.792204] kobject: 'loop2' (0000000030af0c71): kobject_uevent_env [ 530.792409] kobject: 'loop2' (0000000030af0c71): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 530.819096] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 530.825562] b_state=0x00000029, b_size=512 [ 530.829880] device loop0 blocksize: 4096 [ 530.848709] ? __lock_acquire+0x62f/0x4c20 [ 530.853791] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 530.862335] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 530.868784] b_state=0x00000029, b_size=512 [ 530.873030] device loop0 blocksize: 4096 [ 530.880494] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 530.885885] ? find_held_lock+0x36/0x1c0 [ 530.910609] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 530.916977] b_state=0x00000029, b_size=512 [ 530.921456] device loop0 blocksize: 4096 [ 530.935900] ? mark_held_locks+0xc7/0x130 [ 530.958827] schedule+0xef/0x370 [ 530.962922] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 530.969216] b_state=0x00000029, b_size=512 [ 530.973457] device loop0 blocksize: 4096 [ 530.978467] ? __schedule+0x1ed0/0x1ed0 [ 530.985540] ? __rwsem_down_write_failed_common+0x8dc/0x15e0 [ 530.996726] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 531.002973] b_state=0x00000029, b_size=512 [ 531.007215] device loop0 blocksize: 4096 [ 531.012282] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 531.018492] b_state=0x00000029, b_size=512 [ 531.022805] device loop0 blocksize: 4096 [ 531.027272] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 531.033539] b_state=0x00000029, b_size=512 [ 531.037775] device loop0 blocksize: 4096 [ 531.057216] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 531.063649] b_state=0x00000029, b_size=512 [ 531.067889] device loop0 blocksize: 4096 [ 531.073599] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 531.079690] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 531.085930] b_state=0x00000029, b_size=512 [ 531.090206] device loop0 blocksize: 4096 [ 531.103072] ? rcu_read_unlock_special+0x370/0x370 [ 531.108935] ? mark_held_locks+0xc7/0x130 [ 531.117063] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 531.123316] b_state=0x00000029, b_size=512 [ 531.127557] device loop0 blocksize: 4096 [ 531.141166] __rwsem_down_write_failed_common+0xbbc/0x15e0 [ 531.146852] ? print_usage_bug+0xc0/0xc0 [ 531.151044] ? rwsem_spin_on_owner+0xa30/0xa30 [ 531.155641] ? __lock_acquire+0x62f/0x4c20 [ 531.159891] ? __debug_object_init+0x677/0x12d0 [ 531.164649] ? mark_held_locks+0x130/0x130 [ 531.168893] ? __lock_acquire+0x62f/0x4c20 [ 531.173258] ? mark_held_locks+0x130/0x130 [ 531.177508] ? mark_held_locks+0x130/0x130 [ 531.186243] ? debug_object_activate+0x3f8/0x5a0 [ 531.192635] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 531.197772] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 531.214255] ? find_held_lock+0x36/0x1c0 [ 531.218380] ? graph_lock+0x270/0x270 [ 531.222281] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 531.227398] ? lockdep_hardirqs_on+0x421/0x5c0 [ 531.232054] ? trace_hardirqs_on+0xbd/0x310 [ 531.236385] ? graph_lock+0x270/0x270 [ 531.240190] ? graph_lock+0x270/0x270 [ 531.244073] ? lock_acquire+0x1ed/0x520 [ 531.248064] ? deactivate_super+0x2b3/0x320 [ 531.259679] ? lock_release+0xa00/0xa00 [ 531.263936] ? arch_local_save_flags+0x40/0x40 [ 531.268538] rwsem_down_write_failed+0xe/0x10 [ 531.273533] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 531.279761] b_state=0x00000029, b_size=512 [ 531.284074] device loop0 blocksize: 4096 [ 531.288287] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 531.294559] b_state=0x00000029, b_size=512 [ 531.298791] device loop0 blocksize: 4096 [ 531.303166] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 531.309390] b_state=0x00000029, b_size=512 21:13:52 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x401, 0x7, 0x8, 0x0, 0xb, 0x10001, 0xd7, 0xffffffffffffffe1, 0x3, 0x111fcbfc, 0x9925, 0x2}) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2008000) sendfile(r0, r2, 0x0, 0x800000000031) timer_create(0x6, &(0x7f0000000180)={0x0, 0x8, 0x2, @thr={&(0x7f0000000040)="cfd572bbef0dc3e44c09e54629cfb78a228f413010df0c55dde6cc623ab818506480654f7e6f22a0d376aa525d5e928754d79b8a276787ca20733bd41d5d2216b3ec25be50453b4202129fb43c3591685a213610adee67a4c012cc9733b1845e862f6b1004f0992d3f5fac9a64a09e911dd133b6", &(0x7f00000000c0)="037a5e7e873ce185ce3ad0929f95e5a1da78c99a182553668fee2d08c6445f06f7917d92f46de770cc33145dd59fd2f6bbafcca5e6ee7bd490b3aa0a49390dd72ccb1c2f06b2f7718d37676506cf7ca49f87978ac24da86470e559e080d4ac7920a0ed48505fba556e66452a7a4172f15b59e2577285f66e2248861eb4a7009b99fb81ec2e77c21b3554ce17de7f461a45300623c0cb996ad62b0aa825bc8829a309c98310131ce017184344ca"}}, &(0x7f00000001c0)=0x0) timer_settime(r3, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f0000000280)) [ 531.313679] device loop0 blocksize: 4096 [ 531.317885] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 531.324361] b_state=0x00000029, b_size=512 [ 531.328596] device loop0 blocksize: 4096 [ 531.341634] ? rwsem_down_write_failed+0xe/0x10 [ 531.346865] call_rwsem_down_write_failed+0x17/0x30 [ 531.356167] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 531.362441] b_state=0x00000029, b_size=512 [ 531.366680] device loop0 blocksize: 4096 [ 531.372080] down_write+0xa5/0x130 [ 531.385546] ? deactivate_super+0x2b3/0x320 [ 531.390574] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 531.396962] b_state=0x00000029, b_size=512 [ 531.401038] ? down_read+0x120/0x120 [ 531.401204] device loop0 blocksize: 4096 [ 531.405038] ? rcu_read_unlock_special+0x370/0x370 [ 531.414092] deactivate_super+0x2b3/0x320 [ 531.418260] ? mount_ns+0x1d0/0x1d0 [ 531.421888] ? fsnotify_destroy_marks+0x1d2/0x270 [ 531.433384] kobject: 'loop0' (0000000099f4facd): kobject_uevent_env [ 531.437529] ? shrink_dcache_sb+0x350/0x350 [ 531.439828] kobject: 'loop0' (0000000099f4facd): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 531.444216] ? cpumask_next+0x41/0x50 [ 531.444236] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 531.462529] ? mnt_get_writers.isra.27+0xf8/0x150 [ 531.491302] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 531.497767] b_state=0x00000029, b_size=512 [ 531.502007] device loop0 blocksize: 4096 [ 531.510360] cleanup_mnt+0xbf/0x160 [ 531.514978] __cleanup_mnt+0x16/0x20 [ 531.524593] task_work_run+0x1e8/0x2a0 [ 531.533707] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 531.539970] b_state=0x00000029, b_size=512 [ 531.544242] device loop0 blocksize: 4096 [ 531.553224] ? task_work_cancel+0x240/0x240 [ 531.559210] ? switch_task_namespaces+0xb8/0xd0 [ 531.582036] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 531.588395] b_state=0x00000029, b_size=512 [ 531.592630] device loop0 blocksize: 4096 [ 531.597023] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 531.603285] b_state=0x00000029, b_size=512 [ 531.607724] device loop0 blocksize: 4096 [ 531.616403] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 531.622565] b_state=0x00000029, b_size=512 [ 531.626888] device loop0 blocksize: 4096 [ 531.630967] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 531.637368] b_state=0x00000029, b_size=512 [ 531.641604] device loop0 blocksize: 4096 [ 531.651297] do_exit+0x1a23/0x25f0 [ 531.669985] ? do_raw_spin_unlock+0xa7/0x330 [ 531.675987] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 531.682276] b_state=0x00000029, b_size=512 [ 531.686573] device loop0 blocksize: 4096 [ 531.699113] ? mm_update_next_owner+0x990/0x990 [ 531.711038] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 531.717326] b_state=0x00000029, b_size=512 [ 531.721565] device loop0 blocksize: 4096 [ 531.725739] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 531.731885] b_state=0x00000029, b_size=512 [ 531.736203] device loop0 blocksize: 4096 [ 531.740280] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 531.746681] b_state=0x00000029, b_size=512 [ 531.750917] device loop0 blocksize: 4096 [ 531.765977] ? graph_lock+0x270/0x270 [ 531.770775] ? find_held_lock+0x36/0x1c0 21:13:52 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) accept4(r2, &(0x7f0000000100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x80, 0x0) sendto$packet(r1, &(0x7f0000000000)="4f43ec44c5ebb56bbd442c4f53826f667cd4f05d32f0dc5a56ea2528ef6a63b9a32ef5c08ea52229b829f81bab15f96c3f083bb9d8c3ea9ba4dff46b11a5e50090b17dce4be599e3ec857a0214cb4e79b8c51b600b5716f8acd77d6182dfce4c61f7585d8cd96a56f120fe6559ffe331f8ce9eb538f571e62f2cc082f1483c4387685bf937ba4f2e911beced4703ae48df2bfe29bc9e83c2fbcb9495f79c88c80e30198ac090ddf2167824573408909fa0cbd3743891b30d274aea083da54ba22aefc0d60aff4d4199cf706da0f2878a39d4d17f863c037ac9ac5c3c568f514f2cc7f21395b9a244bfb31e3e", 0xec, 0xc080, &(0x7f00000001c0)={0x11, 0xff, r3, 0x1, 0x5, 0x6, @local}, 0x14) ftruncate(r2, 0x2008000) sendfile(r0, r2, 0x0, 0x800000000031) [ 531.777478] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 531.783639] b_state=0x00000029, b_size=512 [ 531.787948] device loop0 blocksize: 4096 [ 531.792730] ? __lock_acquire+0x62f/0x4c20 [ 531.797463] ? lock_downgrade+0x900/0x900 [ 531.803103] ? mark_held_locks+0x130/0x130 [ 531.807870] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 531.814024] b_state=0x00000029, b_size=512 [ 531.818507] device loop0 blocksize: 4096 [ 531.830669] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 531.835961] ? drop_futex_key_refs.isra.15+0x6d/0xe0 [ 531.841246] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 531.847496] kobject: 'loop2' (0000000030af0c71): kobject_uevent_env [ 531.853943] kobject: 'loop2' (0000000030af0c71): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 531.856712] ? futex_wait+0x5ec/0xa50 [ 531.867268] ? futex_wait_setup+0x3e0/0x3e0 [ 531.871594] ? find_held_lock+0x36/0x1c0 [ 531.875663] ? drop_futex_key_refs.isra.15+0x6d/0xe0 [ 531.880916] ? futex_wake+0x304/0x760 [ 531.884988] ? wake_up_page_bit+0x6f0/0x6f0 [ 531.895376] ? graph_lock+0x270/0x270 [ 531.901729] ? memset+0x31/0x40 [ 531.905616] ? find_held_lock+0x36/0x1c0 [ 531.910345] ? get_signal+0x95b/0x1980 [ 531.924769] ? _raw_spin_unlock_irq+0x27/0x80 [ 531.929381] ? _raw_spin_unlock_irq+0x27/0x80 [ 531.933889] do_group_exit+0x177/0x440 [ 531.937856] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 531.943319] ? __ia32_sys_exit+0x50/0x50 [ 531.947470] get_signal+0x8b0/0x1980 [ 531.951213] ? ptrace_notify+0x130/0x130 [ 531.955287] ? print_usage_bug+0xc0/0xc0 [ 531.971065] ? graph_lock+0x270/0x270 [ 531.974986] ? graph_lock+0x270/0x270 [ 531.978970] do_signal+0x9c/0x21c0 [ 531.982518] ? lock_downgrade+0x900/0x900 [ 531.986693] ? kasan_check_read+0x11/0x20 [ 532.001838] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 532.007168] ? setup_sigcontext+0x7d0/0x7d0 [ 532.011673] ? rcu_read_unlock_special+0x370/0x370 [ 532.016690] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 532.022374] ? exit_to_usermode_loop+0x8c/0x380 [ 532.027131] ? exit_to_usermode_loop+0x8c/0x380 [ 532.035554] ? lockdep_hardirqs_on+0x421/0x5c0 [ 532.041211] ? trace_hardirqs_on+0xbd/0x310 [ 532.045543] ? up_read+0x225/0x2c0 [ 532.049124] ? do_syscall_64+0x6be/0x820 [ 532.053213] ? __x64_sys_futex+0x476/0x690 [ 532.057463] exit_to_usermode_loop+0x2e5/0x380 [ 532.069608] ? syscall_trace_enter+0x1260/0x1260 [ 532.074403] do_syscall_64+0x6be/0x820 [ 532.078377] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 532.083750] ? syscall_return_slowpath+0x5e0/0x5e0 [ 532.088726] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 532.093582] ? trace_hardirqs_on_caller+0x310/0x310 [ 532.114921] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 532.125490] ? prepare_exit_to_usermode+0x291/0x3b0 [ 532.138926] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 532.145251] b_state=0x00000029, b_size=512 [ 532.149554] device loop0 blocksize: 4096 [ 532.160389] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 532.165274] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 532.171439] RIP: 0033:0x457759 [ 532.174647] Code: Bad RIP value. [ 532.178014] RSP: 002b:00007effa3a24cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 532.185794] RAX: fffffffffffffe00 RBX: 000000000073bfa8 RCX: 0000000000457759 [ 532.193125] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000073bfa8 [ 532.205585] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 532.213456] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000073bfac [ 532.221289] R13: 00007ffe69d0c13f R14: 00007effa3a259c0 R15: 000000000073bfac [ 532.228801] [ 532.228801] Showing all locks held in the system: [ 532.235926] 3 locks held by kworker/u4:1/21: [ 532.240737] 1 lock held by khungtaskd/1033: [ 532.245287] #0: 00000000604033b9 (rcu_read_lock){....}, at: debug_show_all_locks+0xd0/0x424 [ 532.254214] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 532.260450] b_state=0x00000029, b_size=512 [ 532.264696] device loop0 blocksize: 4096 [ 532.269182] 2 locks held by kworker/1:1H/2462: [ 532.274073] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 532.280296] b_state=0x00000029, b_size=512 [ 532.284531] device loop0 blocksize: 4096 [ 532.288817] 2 locks held by rs:main Q:Reg/7920: [ 532.293930] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 532.300166] b_state=0x00000029, b_size=512 [ 532.304409] device loop0 blocksize: 4096 [ 532.308743] #0: 00000000972812da (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1bb/0x200 [ 532.331790] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 532.338185] b_state=0x00000029, b_size=512 [ 532.342677] device loop0 blocksize: 4096 [ 532.348071] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 532.354316] b_state=0x00000029, b_size=512 [ 532.358553] device loop0 blocksize: 4096 [ 532.362718] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 532.368873] b_state=0x00000029, b_size=512 [ 532.373164] device loop0 blocksize: 4096 [ 532.377263] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 532.383682] b_state=0x00000029, b_size=512 [ 532.387924] device loop0 blocksize: 4096 [ 532.408552] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 532.415039] b_state=0x00000029, b_size=512 [ 532.419276] device loop0 blocksize: 4096 [ 532.447907] #1: 00000000bd494a88 (sb_writers#3){.+.+}, at: vfs_write+0x42a/0x580 [ 532.473709] __find_get_block_slow() failed. block=1, b_blocknr=8 [ 532.480125] b_state=0x00000029, b_size=512 [ 532.484520] device loop0 blocksize: 4096 [ 532.496514] 1 lock held by rsyslogd/7922: [ 532.500687] #0: 0000000035d977b0 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1bb/0x200 [ 532.508923] 2 locks held by getty/8012: [ 532.512935] #0: 0000000020e02ef7 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 532.521192] #1: 00000000d66db352 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ee0 [ 532.535471] 2 locks held by getty/8013: [ 532.539466] #0: 000000003674e13d (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 532.547877] #1: 00000000dad9b69a (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ee0 [ 532.563801] 2 locks held by getty/8014: [ 532.567873] #0: 00000000c94703dc (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 532.576380] #1: 00000000822df1f9 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ee0 [ 532.585487] 2 locks held by getty/8015: [ 532.589541] #0: 000000008b23c69f (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 532.607129] #1: 00000000badf406b (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ee0 [ 532.616456] 2 locks held by getty/8016: 21:13:53 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f0000000240)={0x301, 0x8, 0x19, 'queue0\x00', 0x2c}) ioctl$UDMABUF_CREATE_LIST(r1, 0x40087543, &(0x7f0000000140)={0x1, 0x3, [{r1, 0x0, 0xe000, 0x8000}, {r1, 0x0, 0x1000000000000, 0x1fffff000}, {r1, 0x0, 0x1000000}]}) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r3 = shmget$private(0x0, 0x3000, 0x8, &(0x7f0000ffa000/0x3000)=nil) r4 = getuid() fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = fcntl$getown(r1, 0x9) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000004c0)=0x0) shmctl$IPC_SET(r3, 0x1, &(0x7f0000000500)={{0x20, r4, r5, r6, r7, 0x10a, 0xfffffffffffffe01}, 0x2, 0x7fffffff, 0x39, 0x7, r8, r9, 0xabee6c2}) ftruncate(r2, 0x2008000) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000000)={0x401, 0x1, 'client0\x00', 0xffffffff80000001, "83bbf82fede44b09", "0ec138a47959ec671ad089360600ab52853b2a34da56bf7a7ea46021e4635f28", 0x7, 0x1}) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000}) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000100)={0x4, r10, 0x10003, 0x63}) ioctl$PPPOEIOCSFWD(r2, 0x4008b100, &(0x7f0000000580)={0x18, 0x0, {0x1, @empty, 'syzkaller0\x00'}}) sendfile(r0, r2, 0x0, 0x800000000031) [ 532.620657] #0: 0000000027174dac (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 532.634866] #1: 000000003a55b3a8 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ee0 [ 532.643965] 2 locks held by getty/8017: [ 532.647942] #0: 00000000d94c2919 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 532.656364] #1: 000000004153fc3a (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ee0 [ 532.679581] 2 locks held by getty/8018: [ 532.684024] #0: 00000000952ad0d3 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 532.693095] #1: 00000000ec36305a (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ee0 [ 532.712702] 1 lock held by syz-executor0/16774: [ 532.717619] #0: 00000000b1048f34 (&fc->fs_type->s_umount_key#57){++++}, at: deactivate_super+0x2b3/0x320 [ 532.727547] 3 locks held by syz-executor0/18022: [ 532.732325] [ 532.742927] ============================================= [ 532.742927] [ 532.758274] kobject: 'loop0' (0000000099f4facd): kobject_uevent_env [ 532.776602] NMI backtrace for cpu 1 [ 532.780362] CPU: 1 PID: 1033 Comm: khungtaskd Not tainted 4.20.0-rc7-next-20181224 #188 [ 532.788507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 532.797859] Call Trace: [ 532.800456] dump_stack+0x1d3/0x2c6 [ 532.804087] ? dump_stack_print_info.cold.1+0x20/0x20 [ 532.809279] ? check_preemption_disabled+0x48/0x280 [ 532.814293] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 532.819924] ? lapic_can_unplug_cpu.cold.28+0x3f/0x3f [ 532.825121] nmi_cpu_backtrace.cold.4+0x63/0xa2 [ 532.829813] ? lapic_can_unplug_cpu.cold.28+0x3f/0x3f [ 532.835014] nmi_trigger_cpumask_backtrace+0x1c2/0x22c [ 532.840296] arch_trigger_cpumask_backtrace+0x14/0x20 [ 532.845483] watchdog+0xba1/0x11a0 [ 532.849037] ? hungtask_pm_notify+0xb0/0xb0 [ 532.853356] ? find_held_lock+0x36/0x1c0 [ 532.857422] ? __kthread_parkme+0xce/0x1a0 [ 532.861660] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 532.866766] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 532.871872] ? lockdep_hardirqs_on+0x421/0x5c0 [ 532.876455] ? trace_hardirqs_on+0xbd/0x310 [ 532.880778] ? kasan_check_read+0x11/0x20 [ 532.884923] ? __kthread_parkme+0xce/0x1a0 [ 532.889172] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 532.894624] ? __schedule+0x1ed0/0x1ed0 [ 532.898599] ? preempt_schedule+0x4d/0x60 [ 532.902755] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 532.907857] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 532.913392] ? __kthread_parkme+0xfb/0x1a0 [ 532.917626] ? hungtask_pm_notify+0xb0/0xb0 [ 532.921947] kthread+0x35a/0x440 [ 532.925311] ? kthread_bind+0x40/0x40 21:13:53 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x8e, 0x2001) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2008000) sendfile(r0, r2, 0x0, 0x800000000031) stat(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) fstat(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000440)=[0xffffffffffffffff, 0x0, 0xee00]) pipe2(&(0x7f0000000780), 0x80800) fstat(r1, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000500)=[0xee00, 0xee01]) r10 = getegid() r11 = getgid() getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)=0x0) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000480)={0x1, 0x8, 0x9, 0x3, 0x80000001, 0x4551669b, 0x100000001, 0x1, 0x8, 0x1, 0x4}, 0xb) lstat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r1, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000010004000000000002000400", @ANYRES32=r3, @ANYBLOB="02000500", @ANYRES32=r4, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="02000500", @ANYRES32=r5, @ANYBLOB="040002000000000008000300", @ANYRES32=r6, @ANYBLOB="08000200", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="08000300", @ANYRES32=r9, @ANYBLOB="0800b82f", @ANYRES32=r10, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r11, @ANYBLOB="08000100", @ANYRES32=r12, @ANYBLOB="08000600", @ANYRES32=r13, @ANYBLOB="10000500000000002000010000000000"], 0x84, 0x0) [ 532.929119] ret_from_fork+0x3a/0x50 [ 532.933125] Sending NMI from CPU 1 to CPUs 0: [ 532.939492] INFO: NMI handler (nmi_cpu_backtrace_handler) took too long to run: 1.578 msecs [ 532.939692] NMI backtrace for cpu 0 [ 532.939701] CPU: 0 PID: 20565 Comm: syz-executor4 Not tainted 4.20.0-rc7-next-20181224 #188 [ 532.939709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 532.939714] RIP: 0010:__tlb_remove_page_size+0x74/0x500 [ 532.939728] Code: 9c c8 ff 4d 85 ed 0f 84 fd 01 00 00 e8 b5 9b c8 ff 49 8d bc 24 84 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 9e [ 532.939733] RSP: 0018:ffff8881af86ec28 EFLAGS: 00000a03 [ 532.939743] RAX: dffffc0000000000 RBX: 0000000000001000 RCX: ffffffff81b954fd [ 532.939750] RDX: 1ffff11035f0de4c RSI: ffffffff81b9550b RDI: ffff8881af86f264 [ 532.939757] RBP: ffff8881af86ec58 R08: ffff8881d2aa2640 R09: fffff94000db27ee [ 532.939763] R10: fffff94000db27ee R11: ffffea0006d93f73 R12: ffff8881af86f1e0 [ 532.939770] R13: ffffffffffffffff R14: dffffc0000000000 R15: ffffea0006d93f40 [ 532.939777] FS: 0000000002342940(0000) GS:ffff8881dac00000(0000) knlGS:0000000000000000 [ 532.939783] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 532.939790] CR2: 00007fff0f8c9d8c CR3: 00000001b6327000 CR4: 00000000001406f0 [ 532.939796] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 532.939803] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 532.939807] Call Trace: [ 532.939811] unmap_page_range+0xf88/0x25b0 [ 532.939816] ? vm_normal_page_pmd+0x400/0x400 [ 532.939821] ? kasan_check_read+0x11/0x20 [ 532.939826] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 532.939831] ? rcu_read_unlock_special+0x370/0x370 [ 532.939835] ? rcu_softirq_qs+0x20/0x20 [ 532.939840] ? unwind_dump+0x190/0x190 [ 532.939845] ? is_bpf_text_address+0xd3/0x170 [ 532.939850] ? kernel_text_address+0x79/0xf0 [ 532.939855] ? __kernel_text_address+0xd/0x40 [ 532.939859] ? unwind_get_return_address+0x61/0xa0 [ 532.939864] ? save_stack+0xa9/0xd0 [ 532.939868] ? save_stack+0x43/0xd0 [ 532.939873] ? __kasan_slab_free+0x102/0x150 [ 532.939877] ? kasan_slab_free+0xe/0x10 [ 532.939882] ? kmem_cache_free+0x83/0x290 [ 532.939887] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 532.939892] ? uprobe_munmap+0x14c/0x450 [ 532.939896] ? get_signal+0x8b0/0x1980 [ 532.939901] ? do_signal+0x9c/0x21c0 [ 532.939905] ? uprobe_mmap+0x1130/0x1130 [ 532.939910] ? trace_hardirqs_off+0xb8/0x310 [ 532.939914] ? kasan_check_read+0x11/0x20 [ 532.939919] ? do_raw_spin_unlock+0xa7/0x330 [ 532.939924] ? trace_hardirqs_on+0x310/0x310 [ 532.939928] ? find_held_lock+0x36/0x1c0 [ 532.939933] unmap_single_vma+0x19b/0x310 [ 532.939937] unmap_vmas+0x25c/0x3d0 [ 532.939942] ? zap_vma_ptes+0x110/0x110 [ 532.939946] ? rcu_pm_notify+0xc0/0xc0 [ 532.939951] ? kasan_check_write+0x14/0x20 [ 532.939955] exit_mmap+0x2be/0x590 [ 532.939960] ? __ia32_sys_munmap+0x80/0x80 [ 532.939965] ? __khugepaged_exit+0x455/0x6a0 [ 532.939969] ? __might_sleep+0x95/0x190 [ 532.939973] mmput+0x247/0x610 [ 532.939978] ? lock_downgrade+0x900/0x900 [ 532.939982] ? set_mm_exe_file+0x200/0x200 [ 532.939987] ? kasan_check_read+0x11/0x20 [ 532.939991] ? do_raw_spin_unlock+0xa7/0x330 [ 532.939996] ? do_raw_spin_trylock+0x270/0x270 [ 532.940001] ? up_read_non_owner+0x100/0x100 [ 532.940006] ? __down_interruptible+0x700/0x700 [ 532.940010] do_exit+0xdcc/0x25f0 [ 532.940015] ? __lock_acquire+0x5b1/0x4c20 [ 532.940020] ? mm_update_next_owner+0x990/0x990 [ 532.940024] ? __lock_acquire+0x62f/0x4c20 [ 532.940029] ? __debug_object_init+0x677/0x12d0 [ 532.940034] ? mark_held_locks+0x130/0x130 [ 532.940039] ? kasan_check_read+0x11/0x20 [ 532.940044] ? __debug_object_init+0x677/0x12d0 [ 532.940049] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 532.940054] ? do_raw_spin_trylock+0x270/0x270 [ 532.940059] ? kasan_check_read+0x11/0x20 [ 532.940063] ? find_held_lock+0x36/0x1c0 [ 532.940068] ? graph_lock+0x270/0x270 [ 532.940072] ? print_usage_bug+0xc0/0xc0 [ 532.940077] ? debug_object_activate+0x3f8/0x5a0 [ 532.940082] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 532.940088] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 532.940092] ? find_held_lock+0x36/0x1c0 [ 532.940097] ? graph_lock+0x270/0x270 [ 532.940102] ? __lock_acquire+0x62f/0x4c20 [ 532.940106] ? memset+0x31/0x40 [ 532.940110] ? find_held_lock+0x36/0x1c0 [ 532.940115] ? get_signal+0x95b/0x1980 [ 532.940120] ? _raw_spin_unlock_irq+0x27/0x80 [ 532.940125] ? _raw_spin_unlock_irq+0x27/0x80 [ 532.940129] do_group_exit+0x177/0x440 [ 532.940134] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 532.940148] ? __ia32_sys_exit+0x50/0x50 [ 532.940153] get_signal+0x8b0/0x1980 [ 532.940157] ? ptrace_notify+0x130/0x130 [ 532.940163] ? blkcg_maybe_throttle_current+0xa44/0x1380 [ 532.940167] ? kzfree+0x28/0x30 [ 532.940172] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 532.940176] ? blkcg_exit_queue+0x20/0x20 [ 532.940181] ? find_held_lock+0x36/0x1c0 [ 532.940185] do_signal+0x9c/0x21c0 [ 532.940190] ? _raw_spin_unlock_irq+0x27/0x80 [ 532.940195] ? lockdep_hardirqs_on+0x421/0x5c0 [ 532.940199] ? trace_hardirqs_on+0xbd/0x310 [ 532.940204] ? kasan_check_read+0x11/0x20 [ 532.940209] ? task_work_run+0x1af/0x2a0 [ 532.940213] ? setup_sigcontext+0x7d0/0x7d0 [ 532.940218] ? arch_local_save_flags+0x40/0x40 [ 532.940223] ? filp_close+0x1cd/0x250 [ 532.940228] ? exit_to_usermode_loop+0x8c/0x380 [ 532.940233] ? exit_to_usermode_loop+0x8c/0x380 [ 532.940237] ? lockdep_hardirqs_on+0x421/0x5c0 [ 532.940242] ? trace_hardirqs_on+0xbd/0x310 [ 532.940247] ? do_syscall_64+0x6be/0x820 [ 532.940251] ? copy_fd_bitmaps+0x210/0x210 [ 532.940256] ? do_syscall_64+0x9a/0x820 [ 532.940261] exit_to_usermode_loop+0x2e5/0x380 [ 532.940266] ? syscall_trace_enter+0x1260/0x1260 [ 532.940271] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 532.940276] do_syscall_64+0x6be/0x820 [ 532.940281] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 532.940286] ? syscall_return_slowpath+0x5e0/0x5e0 [ 532.940291] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 532.940296] ? trace_hardirqs_on_caller+0x310/0x310 [ 532.940302] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 532.940307] ? prepare_exit_to_usermode+0x291/0x3b0 [ 532.940312] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 532.940318] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 532.940322] RIP: 0033:0x411211 [ 532.940326] Code: Bad RIP value. [ 532.940331] RSP: 002b:00007ffcf9f31080 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 532.940342] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000411211 [ 532.940349] RDX: 0000000000000000 RSI: 0000000000001b3c RDI: 0000000000000004 [ 532.940355] RBP: 0000000000000000 R08: 00000000d1d11b3c R09: 00000000d1d11b40 [ 532.940362] R10: 00007ffcf9f30fb0 R11: 0000000000000293 R12: 0000000000000000 [ 532.940369] R13: 0000000000000001 R14: 00000000000001c0 R15: 0000000000000004 [ 533.605862] Kernel panic - not syncing: hung_task: blocked tasks [ 533.612055] CPU: 0 PID: 1033 Comm: khungtaskd Not tainted 4.20.0-rc7-next-20181224 #188 [ 533.620215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 533.629576] Call Trace: [ 533.632198] dump_stack+0x1d3/0x2c6 [ 533.635841] ? dump_stack_print_info.cold.1+0x20/0x20 [ 533.641064] panic+0x2ad/0x632 [ 533.644262] ? add_taint.cold.5+0x16/0x16 [ 533.648424] ? nmi_trigger_cpumask_backtrace+0x1a2/0x22c [ 533.653881] ? nmi_trigger_cpumask_backtrace+0x1fe/0x22c [ 533.659336] ? nmi_trigger_cpumask_backtrace+0x1ab/0x22c [ 533.664793] ? nmi_trigger_cpumask_backtrace+0x1a2/0x22c [ 533.670252] watchdog+0xbb2/0x11a0 [ 533.673810] ? hungtask_pm_notify+0xb0/0xb0 [ 533.678130] ? find_held_lock+0x36/0x1c0 [ 533.682224] ? __kthread_parkme+0xce/0x1a0 [ 533.686471] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 533.691583] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 533.696693] ? lockdep_hardirqs_on+0x421/0x5c0 [ 533.701282] ? trace_hardirqs_on+0xbd/0x310 [ 533.705605] ? kasan_check_read+0x11/0x20 [ 533.709758] ? __kthread_parkme+0xce/0x1a0 [ 533.713999] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 533.719455] ? __schedule+0x1ed0/0x1ed0 [ 533.723428] ? preempt_schedule+0x4d/0x60 [ 533.727597] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 533.732714] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 533.738260] ? __kthread_parkme+0xfb/0x1a0 [ 533.742501] ? hungtask_pm_notify+0xb0/0xb0 [ 533.746825] kthread+0x35a/0x440 [ 533.750203] ? kthread_bind+0x40/0x40 [ 533.754011] ret_from_fork+0x3a/0x50 [ 533.758715] Kernel Offset: disabled [ 533.762343] Rebooting in 86400 seconds..