0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}) 22:57:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a07000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:57:59 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x3f000000, &(0x7f00000001c0)={0x77359400}) 22:57:59 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:00 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfe}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:58:00 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}) 22:58:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000080000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:00 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000006c000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:00 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0xf0ffffff, &(0x7f00000001c0)={0x77359400}) 22:58:00 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:00 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000}) 22:58:00 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0xf0ff7f, &(0x7f00000001c0)={0x77359400}) 22:58:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000003f000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:00 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00}) 22:58:00 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000040000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:01 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:58:01 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x1000000, &(0x7f00000001c0)={0x77359400}) 22:58:01 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:01 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf}) 22:58:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000fdfdffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:01 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:01 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) 22:58:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000feffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:01 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 22:58:01 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00011000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:01 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) fcntl$setlease(r1, 0x400, 0x2) 22:58:02 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:58:02 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000}) 22:58:02 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:02 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) readv(r0, &(0x7f0000000400)=[{&(0x7f0000000100)=""/144, 0x90}, {&(0x7f0000000200)=""/255, 0xff}, {&(0x7f0000000300)=""/238, 0xee}, {&(0x7f00000012c0)=""/4096, 0x1000}], 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) r2 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) ioctl$BLKFLSBUF(r2, 0x1261, &(0x7f00000000c0)=0x29) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000440)={'team0\x00', {0x2, 0x4e20, @multicast2}}) 22:58:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000009004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000070000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:02 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) 22:58:02 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:02 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:02 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf}) 22:58:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000230000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000048004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:03 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:58:03 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:03 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) getsockname(r1, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000100)=0x80) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) getsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x8) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000300)=""/119, &(0x7f0000000200)=0x77) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x1000, 0x0) fanotify_mark(r3, 0x1, 0x0, r4, &(0x7f00000002c0)='./file0\x00') 22:58:03 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 22:58:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000060004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000fffffdf90000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:03 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000}) 22:58:03 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:03 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}) 22:58:03 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000fffffff4004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000003f000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:04 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfefdffff00000000}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:58:04 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000}) 22:58:04 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x2b3) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:04 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:04 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000500000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000023000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:04 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:04 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) ioctl$sock_ifreq(r1, 0x8933, &(0x7f0000000200)={'bridge0\x00', @ifru_mtu=0x7}) mount$9p_xen(&(0x7f0000000080)='!wlan1+user&^/\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x122010, &(0x7f0000000140)=ANY=[@ANYBLOB="7473616e733d78656e2c6163636573733d757365722c7065726d69745f646972656374696f2c7063723d30303030303030303030303030303030303032352c66736e616d653d6362632861657329002c7375626a5f757365723d6362632861657329002c80"]) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:04 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00}) 22:58:04 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:04 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}) 22:58:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00060000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:05 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b00000000}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:58:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000e000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:05 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:05 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000}) 22:58:05 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x80000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r2, 0x80045300, &(0x7f00000000c0)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x202303, 0x0) 22:58:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a05000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:05 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00}) 22:58:05 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363af6ffffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:05 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:05 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) 22:58:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000231f7dc339e55e1c004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:06 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf}) 22:58:06 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:58:06 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363afffffdfd000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000020004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:06 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x8000, 0x30) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0xb0, r2, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xfffffffffffffff9}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x20}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x32}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x809}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x44000}, 0x0) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000200)) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000140)=0xffffffffffffff4a) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000280)={0x3, r1}) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000240)={'veth0_to_bond\x00', 0x4}) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="7365637500000000697e9afcf967a7c5e7db3cd6c4f73d72dbb3c7f600fb8d06789219fde04cb50a5a6c7ab5655d2e567244669f095ef46544daa133d5075bf6ddecfb116a54aea335f515e09a7dce0fe73f177e29"], &(0x7f0000000100)='@:(em1\x00', 0x7, 0x3) r3 = accept$alg(r0, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180), 0x0, &(0x7f00000011c0)=""/157, 0x9d}, 0x2}], 0x1, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:06 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 22:58:06 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:06 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r0, 0x8, r2) 22:58:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000fffffffd00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:06 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000}) 22:58:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000040000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:06 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:06 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) 22:58:07 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:58:07 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:07 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf}) 22:58:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000100000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000009000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) recvfrom$llc(r0, &(0x7f0000000580)=""/117, 0x75, 0x100, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x2) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f00000004c0)={0x4, {0x2, 0x4e21, @local}, {0x2, 0x4e20}, {0x2, 0x4e20, @loopback}, 0x220, 0x20, 0xffffffff, 0x1ff, 0x1, &(0x7f0000000480)='bridge_slave_1\x00', 0x5, 0x6, 0x7}) write$P9_RFSYNC(r2, &(0x7f0000000540)={0x7, 0x33, 0x1}, 0x7) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000240)={0x9, {{0xa, 0x4e24, 0x9, @local, 0xa1}}, 0x1, 0x3, [{{0xa, 0x4e21, 0xbe, @empty, 0x3}}, {{0xa, 0x4e24, 0x5714, @remote, 0x8}}, {{0xa, 0x4e22, 0x8, @local, 0x7}}]}, 0x210) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000140)=@nl=@proc, 0x291, &(0x7f0000001180), 0x0, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1, 0x40, &(0x7f00000001c0)={0x77359400}) 22:58:07 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:07 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000}) 22:58:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a07701fd6920153840f0ced5c54dbb7", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000300)='/dev/bus/usb/00#/00#\x00', 0x40000000000005, 0x100007fffd) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000340)={0x13a, 0x3, 0x8008, 0xa9, 0x3, 0x20, 0x8, 0x9, 0x0}, &(0x7f0000000380)=0x20) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000440)={r3, 0x58, &(0x7f00000003c0)=[@in6={0xa, 0x4e24, 0x80000001, @local, 0x6}, @in6={0xa, 0x4e20, 0x7, @remote, 0x4fd}, @in={0x2, 0x4e24, @multicast2}, @in={0x2, 0x4e23}]}, &(0x7f0000000480)=0x10) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x8000, 0x0) r5 = gettid() getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x14) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000540), 0x4) mq_notify(r4, &(0x7f00000002c0)={0x0, 0x29, 0x4, @tid=r5}) r6 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x80) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000180)={0x0, 0xca, 0x30, 0x3, 0x7}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000240)={r7, 0x3}, 0x8) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000100)) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x2b0, &(0x7f0000000100), 0x0, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000003000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:07 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:07 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 22:58:08 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}) 22:58:08 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:58:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363affffffffffffffff0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:08 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0xfffffe9a) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) llistxattr(&(0x7f0000000100)='.\x00', &(0x7f00000012c0)=""/4096, 0x1000) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0x30e245376bcb6c6f}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) r2 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/exec\x00', 0x2, 0x0) ioctl$FICLONE(r2, 0x40049409, r0) poll(&(0x7f00000000c0)=[{r0}, {r1, 0x3000}, {r1, 0x400}], 0x3, 0x0) 22:58:08 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000ffffffff004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:08 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:08 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000}) 22:58:08 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="20a7cf357e1bbb482f07140ef981ccb5dc2e112574d157e0345fb55de1f23b6625bbddcf382019dcdd828e8e2c9643c9ac1dab9592bf25c0835fd185e3bb6ec3fb0be6c7521b1d9a208739eba8d5cca12e519f0c6177d5e71216c03290d22d75e645927b7b70f9550db48146f4c63666e40e95512ee37ab6929168177a6575bfe9d1a9b35b74acfe348311d0eb0e59853064b0fed3b1", 0x96) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x20800, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000002c0), &(0x7f0000000300)=0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) splice(r0, &(0x7f0000000080), r0, &(0x7f00000000c0), 0xf, 0x0) r2 = accept$alg(r0, 0x0, 0x0) rseq(&(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x5, 0x0, 0x7e3}, 0x7}, 0x20, 0xfffffffffffffffd, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x3) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000050000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000ffffffffffffffe0004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:08 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:08 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00}) 22:58:09 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:09 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000fffffff5004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:09 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:58:09 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x2]}) 22:58:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00fffffdfd0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:09 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x2100, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000100)={0x5, 0x7, 0xee, &(0x7f0000000200)="6a603f2acbed75fe59ac9a4c8afccefcb5cab48b0cd9fe1716b861664ec4064f03810520a6b69a72c108ba302e215e8f400607f79b82bea942942ce0447f8d7489c2dc1f44d0c3431dc77e005bd99ef6ee61bd8c6379b1cb79558fef926ea8b1601ca01d08bd721ffb630964d3130949abdabd8f75253bcb8066e822c650d7b22f9fad57f07b1093e682c7b9f76c484ca92618d7235a391afd527fb301137858c698b9d0590c7ba167c0c1b6d0d9cd503b9fe6d3e8a255f5fe602f2c00388619d6731b7854e5e5fa3618237de40411a305ea0919f45d3b5e9167c4107b79daffaaba530d105a4c5144d6ad5af2c2"}) r2 = accept$alg(r0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VT_ACTIVATE(r3, 0x5606, 0x7) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:09 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:09 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0xbf]}) 22:58:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a007fffffff0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:09 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:09 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000a00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:09 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x200000000000000]}) 22:58:09 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:10 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0xbf00000000000000]}) 22:58:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x8000, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000700004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:10 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfefdffff}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:58:10 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000007fffffff004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:10 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0xbf000000]}) 22:58:10 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000002300004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:10 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000400)="38894bd057da44b1ff7e30aba8b3d047", 0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f00000000c0)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000200)={r1, 0x9f, "dbd8fd57ddabfc4e37feaf90b72a0e49080f55a40145e0a2117ff92da536592ea3bc38a8d617083d9a0ff107dd61bc1e3c0d3e043a7185dc247dd94256db6a27056fb9da5b65c874de17ae10e4a14c071673665c392a0587c06eb0ada16614f8aefe8ae7c4bda27b258ba4a12de134b863c29764a63b414f4c61c123f606dc7fab87798d28c5e89d1b56f973410357e66091b1375aca848e4bb0bc5b07ae09"}, &(0x7f0000000180)=0xa7) r3 = socket$alg(0x26, 0x5, 0x0) time(&(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@assoc_value={r2, 0x2}, 0x8) bind$alg(r3, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r4 = accept$alg(r3, 0x0, 0x0) getsockopt$XDP_STATISTICS(r4, 0x11b, 0x7, &(0x7f00000003c0), &(0x7f0000000440)=0x18) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000300), &(0x7f0000000340)=0x4) recvmmsg(r4, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000fffffe00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:10 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:10 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x2000000]}) 22:58:10 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0xbf00]}) 22:58:11 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:58:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000040000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:11 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:11 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0xbf000000]}) 22:58:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000fffffdf900000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:11 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x5, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000100)=&(0x7f00000000c0)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0xfffffd5a) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:11 executing program 2: utimensat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={{0x0, 0x7530}}, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) clock_nanosleep(0x6, 0x1, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000240)) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180), 0x0, &(0x7f0000000080)=""/157, 0x9d}}], 0x1, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:11 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0xbf00]}) 22:58:11 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00fffffff50000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00002010000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x3, 0x1) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r2, 0xc0845658, &(0x7f00000000c0)={0x0, @bt={0x0, 0x80, 0x0, 0x0, 0x5, 0x5, 0x10000, 0x5, 0x80, 0x1, 0x6, 0x100000001, 0x8000, 0x10001, 0xe}}) 22:58:12 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x2]}) 22:58:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x5) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00c0ed00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000800000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:12 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:12 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:58:12 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:12 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0xbf]}) 22:58:12 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00ffffffffffff070000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000000000007a004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="a248c1ef89d73bb8aa2826d82082a0d0e520179828b1eeb3474fac98fe7273537eacf317afa4bebff18d8261c2d63ca13b0220c69f18a4c5bfd72a249787d18c307398de63153fd0a71bd1d7a1ad3089d6a5ba4a9f00dc304c", 0x59, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r1) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x511000, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r2, 0x4004af61, &(0x7f00000000c0)) r3 = accept$alg(r0, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x18}, 0x10) 22:58:12 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x200000000000000]}) 22:58:12 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:13 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:58:13 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0xbf00000000000000]}) 22:58:13 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a008cffffff0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000000000000a004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_MCE_KILL_GET(0x22) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x7, 0x0) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f00000000c0)) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775d105e381e5b3b60ced5c54dba7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:13 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:13 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x2000000]}) 22:58:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000edc000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:13 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x200000000000000]}) 22:58:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000fffffff400004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:14 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfefdffff00000000}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:58:14 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:14 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0xbf00000000000000]}) 22:58:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000fffffdfd00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x80000001}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000180)={r2, 0x3c, &(0x7f0000000140)=[@in6={0xa, 0x4e20, 0x400, @remote, 0x6}, @in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e21, @remote}]}, &(0x7f0000000200)=0x10) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r3 = accept$alg(r0, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) ioctl$LOOP_CLR_FD(r1, 0x4c01) 22:58:14 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000200000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:14 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:14 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x2000000]}) 22:58:14 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:14 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0xbf000000]}) 22:58:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) r1 = socket(0x2, 0x800, 0x100000000) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000080000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:15 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:58:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000ffffffffffffff7f004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:15 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:15 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0xbf00]}) 22:58:15 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) signalfd4(r0, &(0x7f0000000080)={0x4}, 0x8, 0x800) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0775b020e381e5b305b193fb0eae44", 0x347) r1 = accept$alg(r0, 0x0, 0x0) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000100)={'veth1_to_bond\x00', 0x3}) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000090000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:15 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:15 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x2]}) 22:58:15 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0xa, 0x5, 0xfffffffffffffffb) r2 = accept4$packet(r1, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000300)=0x14, 0x80000) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000340)={@loopback, @local, @mcast1, 0x0, 0xffff, 0x81, 0x500, 0x7, 0x2, r3}) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-aesni-avx2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r4 = accept$alg(r0, 0x0, 0x0) r5 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x0, 0x2) io_setup(0x1000, &(0x7f00000003c0)=0x0) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0xaa1, r2, &(0x7f0000000400)="29c2df4cc202c68ed333b34d00e006f2e9353b82f6ac6144ce23afaf2f67ff454dc4b5ee811e53b28b4bc3cfd0d07d492db34a97246ae4f3f1448114dc8ba61fcf0c5fc44a418cb98afe57fa02afc029f174c929d813da1b819e658aca630cec9b114e9c61c8585ab31c374df2f2fd468dc5481388c6b50853b8fcd548f079269a6a466cf3cd31c4aaa11157e88260dd9d2511cf78b0595274bcc14bd7a9dd6e9b3fb7144c91fb32629c612daa8487df4b427073821a4d69723db5ed997f32fce221f6a036aec03264ae6db5616bf4bc", 0xd0, 0x7, 0x0, 0x0, 0xffffffffffffff9c}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0xa, 0x3f, r2, &(0x7f0000000540)="f02e468f246c9fd2dfbc055a0dc6f8d2d2c0117cca30ef", 0x17, 0xa7f4, 0x0, 0x1, r5}]) statx(r5, &(0x7f0000000700)='./file0\x00', 0x4800, 0xa00, &(0x7f0000000740)) ioctl$TIOCGSOFTCAR(r5, 0x5419, &(0x7f0000000000)) ioctl$ASHMEM_GET_PIN_STATUS(r5, 0x7709, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x100000001) ioctl$TCSBRK(r4, 0x5409, 0x2) setsockopt$IP_VS_SO_SET_DELDEST(r5, 0x0, 0x488, &(0x7f00000000c0)={{0xbb, @multicast2, 0x4e22, 0x0, 'sh\x00', 0x28, 0x170, 0x5e}, {@remote, 0x4e22, 0x6, 0x8000, 0x2, 0x78}}, 0x44) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000040), &(0x7f0000000280)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000980)={'team0\x00', 0x0}) getsockopt$inet6_dccp_buf(r5, 0x21, 0x2, &(0x7f0000000600)=""/134, &(0x7f00000006c0)=0x86) ioctl$sock_inet6_SIOCDELRT(r5, 0x890c, &(0x7f00000009c0)={@ipv4={[], [], @multicast1}, @local, @remote, 0xae19, 0xfffffffffffffffd, 0xfcb, 0x500, 0x8, 0x80000008, r7}) recvmmsg(r4, &(0x7f0000001280)=[{{&(0x7f0000000140)=@nl=@proc, 0x80, &(0x7f0000001180), 0x0, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1, 0x0, &(0x7f00000001c0)={0x77359400}) lseek(r1, 0x0, 0x3) 22:58:15 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:15 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0xbf]}) 22:58:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000900000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:16 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:58:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000110000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:16 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:58:16 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{r2, r3/1000+30000}, 0x12, 0x9, 0x7}], 0xb) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="ff6f70f6996d7f688ed7f3244ab38cce12b3ca9f336b145f56a6777c01d595f5a7e4d4476ecba90abbcbf3b6c94774977e300d31ae7eacf9ca10a308dcd10355e0af4f41d72274cb9a5227f0eb242f1d1782c8a96969cf0a959bb339", 0x5c) 22:58:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000f6ffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:16 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x2000000]}) 22:58:16 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:16 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xbf000000]}) 22:58:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00fffffdf90000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000068004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:16 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:17 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xbf00]}) 22:58:17 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:17 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfe}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:58:17 executing program 2: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)=0x0) sched_getattr(r0, &(0x7f00000000c0), 0x30, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:17 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x2]}) 22:58:17 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000fffffff6004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:17 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000004000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:17 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:17 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0xbf]}) 22:58:17 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0ef185afebcbf64430edf68847c3d1ad523b15b7adf5ef088b494fb8d55a441e827d2a0c9433b666", 0x28) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) r2 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x1, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f00000000c0)=0x1200, 0x4) socket$alg(0x26, 0x5, 0x0) 22:58:17 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x200000000000000]}) 22:58:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000a000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000001100000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:18 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:58:18 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:18 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:58:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000700000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:18 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000100)='*:+vboxnet1vboxnet0trustedvmnet0\x00', 0x21, 0x1) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000002000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:18 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:18 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:58:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000300000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:18 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$UHID_DESTROY(r0, &(0x7f0000000180), 0x4) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(serpent)\x00'}, 0x8e) r2 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x7, 0x100) getsockopt$packet_buf(r2, 0x107, 0x0, &(0x7f0000000100)=""/53, &(0x7f0000000140)=0x35) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x400000, 0x0) r3 = accept$alg(r1, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000750e000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:18 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:19 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:19 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:58:19 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:58:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00020000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:19 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000009000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:19 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:58:19 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:19 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0xfffffffffffffdba) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = add_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="92675d9db1d3bb091ec4f2b350b5965c6fb902b9c1ada8d3e326bbaf27cf9d5f6c2df25ce9da80fa77793253b9973d95874e4f7eb9d6481cda5b632db4c983c3c25a619c6ea44a59fd9d0cd69075ee5e2cc443fdddb34550ad81d2a83b296f031cccc30d42efa0c8eb1c08ea5d60030a344aaa4c2fce1f0a72e91e717841caef7dcc3fa46cf92b550d", 0x89, 0xfffffffffffffff8) keyctl$update(0x2, r2, 0x0, 0x0) pread64(r0, &(0x7f0000000280)=""/159, 0x9f, 0x1a) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:19 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x2d7) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:19 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:19 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2]}) 22:58:19 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x80, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:19 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:19 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:58:20 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:58:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000200000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00fffffe000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:20 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:58:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f00000008c0), 0x0, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1, 0x0, &(0x7f00000001c0)={0x77359400}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl(r0, 0x2, &(0x7f00000007c0)="96e11132550d638ac41bb0ffbd2e6ef61903e9c1ed2b83") setxattr$security_capability(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='security.capability\x00', &(0x7f0000000880)=@v2={0x2000000, [{0x2528c0, 0x1}, {0x0, 0x6}]}, 0x14, 0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x4, &(0x7f0000000100)=[{&(0x7f0000000200)="e9ca3fd58f791a79f85e1167597cc772d26538893280c3c80aed66fb84d150b1afb5291090d61fde368fa2bef63b0171e69ca9506b3b5fe7fff01d5a13558a82883fd65bf5cb1e3533c68b035b95a018aa7b3f013a88373aab8519fce803de5b708bd8215a69fbe59f993b558d4f56c589272fd4a2e632396985bdf16fdf09a88ee2988de7760b527f5928672595071ddabc5c92933aa9382f5d83fb8a20ca243eb81c21f76a2f832014b56c2d733a1500d9a5ec7e09110773a30bf11b4903b41fede2d751a5e49c3d0b162a442ae0d1ba60b279c37cd78b3483dd567fdcf47ff35fe291f0e99be11c35ffd1e30cc2cb", 0xf0, 0xfffffffffffffc01}, {&(0x7f0000000300)="b163000268a2a11f308af4f1dccbc0992f2553072f46b5fe279b813fb2a7bd3c73abec3be3256f08a07a53765b720a105495562c8019cb5b00ddc0c3f92be05989c067ff296919e60e6a69b520c4f2950470ec883c7f2c68276ba12754b19d90633cd6169fbedc9d2f8fb7d1e4a6f4ad3fdbaa91d6c1812b3bfff0f7c9681291f5242f0d49ce3fbc7be96be07cb987b90377c8b8fbe403f1104d576b3aceace1f5960c6fef05bae693ed088298d5fc735b61aecf7078a61160584a666d4c50e322f85cce3b253109c3024c811446521eef3ac03a54769e3d5f5b181b9562687d", 0xe0, 0xb2fb}, {&(0x7f0000000400)="0eb6acc76c3c50ce6805f4ee1e6744352ab9f7c02e1e54887ae38edbfc3098704cd40725f97f4fb0327521553792b361b0652ee159bdce82120e2eab9ef89b3c7af005eec44b5b0ae7f6642015d5562329fae648bda47915ae3d768c55644a00e0eeb6a462e512b6042c61844db493df4c9e3995108b6e6bf678264a6c3db7e4bca04c10aef8bcb99e897224152662107b99ef945aa9c3acfb428676ab3ccbd510d600f8b550ec60317e2f6be90ce625cbc77baaa51417cd523a8424d94c051976a16d9437e4502cac889980fae8ce753fbc445b167044648c2ae0037e32bbc2464b0ce58c38af47b293c54c61dd65e97fba", 0xf2, 0x180000}, {&(0x7f0000000500)="5937cb46d2246d15bb90e5d5192a8e5aaa9f1490e29b47e50a4b68c670998c44ac0b3f5eae64aeda0b769a4bc7c390e46780e9aea2825448aa30ea9a98b4e7940f370fe459454da339f78302f862e4c98e5e18bc1714052588cc1aca38fe67e9c403a7c63fbe0a161b478e8886d77981df8063a4af150f749656c5e5151fa6ce80b4d8a984bc175fd2c436df769a3c2d247108bff697645e898359e4f89dc3f87bc48f79d86ceda4ffe8f0ffef2c140ee27688fc8fcf3bb7598176b7eb899a97167953759b4590b911af16019f0ad266ec4b44ee2d6d283efdf873bb67cb6b6537af", 0xe2, 0x2}], 0x10000, &(0x7f0000000700)=ANY=[@ANYBLOB='nodots,dots,nodots,dots,nodots,fowner=', @ANYRESDEC=r2, @ANYBLOB="2c66736d61676903000000000000003030303030303030303030342c7569643e", @ANYRESDEC=r3, @ANYBLOB=',fsmagic=0x0000000000000009,\x00']) 22:58:20 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:20 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:58:20 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) [ 1395.948156] FAT-fs (loop2): Unrecognized mount option "fowner=18446744073709551615" or missing value 22:58:20 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x200001, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000240)={0x3, 0x738d, 0xc7, 0x5}, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000003c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0xfffffffffffffe99) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) fstat(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000080)='./file0\x00', r3, r4) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180), 0x0, &(0x7f0000000300)=""/157, 0x9d}}], 0x0, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:20 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:58:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000010000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:20 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:21 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:58:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000ffffffffffffffff004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:21 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:58:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x9, 0x3, &(0x7f0000000300)=[{&(0x7f0000000100), 0x0, 0x2}, {&(0x7f0000000200)="c115b188c826d11028958bf6ddb5a9adc93522cb906db4ea3593b677f88674b8cf84bc9db5654c6d04644606bf94d101d3fac7601be8a512b3cb18fa8b8d82bf829f604889f5409fd3c141df8563da934ecdd667bdba5546cdc76559b03e2aff1e503315f7c17fa78e24f13c938c1ad54e5746e4da24593e0c251f3c9f176333d9c6e8b5175b71ade86e7def2ce9dd28ae8221c6eb719eecf21c36df24a94c63e66bd3bd7591f0d99a51eb007c941b3446558edbe9f9c00f2c44bc46daaeca1de8", 0xc1, 0x4}, {&(0x7f0000000140)="dc4863fc9b4dca2a26", 0x9, 0x7}], 0x1, &(0x7f0000000180)={[{@allocsize={'allocsize', 0x3d, [0x7f, 0x35]}}, {@allocsize={'allocsize', 0x3d, [0x7f, 0x34, 0x31]}}], [{@hash='hash'}]}) r2 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x6, 0x2) write$UHID_CREATE(r2, &(0x7f0000000400)={0x0, 'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000380)=""/113, 0x71, 0x65dd41c2, 0x7, 0x4, 0x59, 0x8}, 0x120) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:21 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000050000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:21 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:21 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:58:21 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000500000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:21 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:58:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000080)=0x2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:22 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b00000000}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:58:22 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000c0ed000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:22 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:58:22 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000080)={{0x6c, @local, 0x4e23, 0x1, 'ovf\x00', 0x1b, 0x1, 0x51}, {@rand_addr=0x10001, 0x4e20, 0x3, 0x80000001, 0xfffffffffffffc01, 0x6}}, 0x44) 22:58:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00003f00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:22 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:22 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:58:22 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:22 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:58:22 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x41, 0x0) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f0000000180)={0xe9f0, 0x7, @name="f1595d99ad377168e6e3a5bd8c4dc5e9fa960fb7c4155e82df043e2882b6394f"}) accept$alg(r1, 0x0, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x1, 0x2) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f00000000c0)={{0x2, 0x4e21, @local}, {0x7, @random="bd7bbc593e3e"}, 0xc, {0x2, 0x4e24, @local}, 'bridge0\x00'}) recvmmsg(r1, &(0x7f0000005ec0)=[{{&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000280)=""/118}, {&(0x7f0000000300)=""/94}, {&(0x7f0000000380)=""/42}, {&(0x7f00000003c0)=""/100}, {&(0x7f0000000440)=""/48}, {&(0x7f0000000480)=""/7}], 0x0, &(0x7f0000000540)=""/216, 0x0, 0xfffffffffffffffe}, 0x81}, {{&(0x7f0000000640)=@alg, 0x0, &(0x7f0000000ac0)=[{&(0x7f00000006c0)=""/205}, {&(0x7f00000007c0)=""/9}, {&(0x7f0000000800)=""/196}, {&(0x7f0000000900)=""/53}, {&(0x7f00000012c0)=""/4096}, {&(0x7f0000000940)=""/152}, {&(0x7f0000000a00)=""/167}], 0x0, &(0x7f0000000b40)=""/234, 0x0, 0xffffffffffffffc1}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000c40)=""/79}, {&(0x7f0000000cc0)=""/34}, {&(0x7f0000000d00)=""/134}], 0x0, &(0x7f0000000e00)=""/127, 0x0, 0x9}, 0x9}, {{&(0x7f0000000f40)=@xdp, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000fc0)=""/212}, {&(0x7f0000000e80)=""/59}], 0x0, &(0x7f00000022c0)=""/4096, 0x0, 0x9b}, 0x3}, {{&(0x7f0000001100)=@nfc, 0x0, &(0x7f0000003380)=[{&(0x7f0000001180)=""/40}, {&(0x7f00000032c0)=""/188}], 0x0, &(0x7f00000033c0)=""/222, 0x0, 0x2be6}, 0xffb8}, {{0x0, 0x0, &(0x7f0000003800)=[{&(0x7f00000034c0)=""/23}, {&(0x7f0000003500)=""/159}, {&(0x7f00000035c0)=""/182}, {&(0x7f0000003680)=""/69}, {&(0x7f0000003700)=""/229}], 0x0, 0x0, 0x0, 0x3}, 0xfff}, {{&(0x7f0000003880)=@alg, 0x0, &(0x7f0000005b40)=[{&(0x7f0000003900)=""/4096}, {&(0x7f0000004900)=""/4096}, {&(0x7f0000005900)=""/136}, {&(0x7f00000059c0)=""/180}, {&(0x7f0000005a80)=""/179}], 0x0, &(0x7f0000005bc0)=""/248, 0x0, 0x1}, 0x401}, {{&(0x7f0000005cc0)=@nfc, 0x0, &(0x7f0000005e40)=[{&(0x7f0000005d40)=""/207}], 0x0, &(0x7f0000005e80)=""/19, 0x0, 0x7ff}, 0x7}], 0x2fe, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000006004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:23 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:58:23 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00004000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:23 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:23 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:58:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000100004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:23 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:23 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:58:23 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00f9fdffff0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:23 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:23 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:58:24 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000007004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:24 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0)={0x300000000000000}, 0x8}) 22:58:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:sendmail_exec_t:s0\x00', 0x25, 0x3) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:24 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:58:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000fffffff500004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:24 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:58:24 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000c0ed000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000e0ffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) socketpair(0xb, 0x807, 0x5, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$KVM_SET_NR_MMU_PAGES(r2, 0xae44, 0xfffffffffffffff9) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:24 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:25 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:58:25 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:25 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:58:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00100000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:25 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0)={0x1000000000000}, 0x8}) 22:58:25 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000000c0)={{{@in6, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000000200)=0xe8) 22:58:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000400000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:25 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:25 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:58:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000004000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000900000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:25 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:26 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:58:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00008cffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:26 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:26 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0)={0xffc99a3b00000000}, 0x8}) 22:58:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) ptrace$getsig(0x4202, r1, 0x400, &(0x7f00000000c0)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:26 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:58:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000007ffffffffffff00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:26 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000fffffffb004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:26 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:58:26 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:26 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:26 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:58:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000fff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00fffffdfc0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:27 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0)={0x3}, 0x8}) 22:58:27 executing program 2: timerfd_create(0xf, 0x800) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000080)={0x2042, 0x5, 0x3}) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x2) connect$vsock_stream(r2, &(0x7f0000000180)={0x28, 0x0, 0xffffffff, @my=0x0}, 0x10) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) ioctl$VIDIOC_G_FBUF(r2, 0x8030560a, &(0x7f0000000100)={0x2, 0x40, &(0x7f00000000c0)="cbd07c925fda3f38b25083c3efd258db0b240f", {0x1, 0x100000000, 0x47425247, 0x6, 0x50, 0x80, 0xb, 0x9b}}) 22:58:27 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:27 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:58:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000400000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000001004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:27 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:27 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:58:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000008004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000feffff0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:27 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:58:28 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000600000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:28 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000080)=""/98, &(0x7f0000000100)=0x62) 22:58:28 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0)={0x900000000000000}, 0x8}) 22:58:28 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:58:28 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000fffffffb00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:28 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:28 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:58:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000700000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:28 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:28 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:58:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000e7500000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:29 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:29 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000080)={'IDLETIMER\x00'}, &(0x7f00000000c0)=0x1e) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280), 0x0, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:29 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0)={0xffc99a3b}, 0x8}) 22:58:29 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:58:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000600004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:29 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = dup2(r0, r0) ioctl$VIDIOC_G_JPEGCOMP(r1, 0x808c563d, &(0x7f0000000080)) ioctl$VIDIOC_G_JPEGCOMP(r1, 0x808c563d, &(0x7f0000000200)) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000002000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:29 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:58:29 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:29 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:29 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:58:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00fffffff60000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:29 executing program 2: syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x40000) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) r1 = semget(0x2, 0x6284f351bdcbbc34, 0x40) semctl$GETPID(r1, 0x0, 0xb, &(0x7f0000000200)=""/77) r2 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x20000, 0x1) mkdir(&(0x7f0000000380)='./file0\x00', 0x10) mq_timedreceive(r2, &(0x7f00000000c0)=""/144, 0x90, 0x800, &(0x7f0000000180)={0x0, 0x989680}) io_setup(0x401, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r3 = accept$alg(r0, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) bind$alg(r2, &(0x7f0000000300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f00000003c0)={@rand_addr, @multicast1, 0x0}, &(0x7f0000000400)=0xc) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f00000004c0)={0x31, 0x4, 0xb, 0x1d, 0x9, 0x1, 0x2, 0xe2, 0xffffffffffffffff}) bind(r3, &(0x7f0000000440)=@ll={0x11, 0x16, r4, 0x1, 0x6, 0x6, @link_local}, 0x80) 22:58:30 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000fffffdfc00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) accept4(r0, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, &(0x7f0000000100)=0x80, 0x800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:30 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:58:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000010200000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:30 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0)={0x900}, 0x8}) 22:58:30 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:58:30 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00102000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:30 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:58:30 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000f9fdffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:30 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:31 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0)={0xfffffdfe}, 0x8}) 22:58:31 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:58:31 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$VIDIOC_G_CROP(r1, 0xc014563b, &(0x7f0000000200)={0xb, {0x7, 0x75, 0xdd0, 0x1}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000080)='cbc(aes)\x00', 0xffffffffffffffff}, 0x30) ptrace$peek(0x1, r2, &(0x7f0000000100)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r3 = accept$alg(r0, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r4, 0x10e, 0x3, &(0x7f0000000140)=0x5, 0x4) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:31 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00f4ffffff0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000ffffff8c004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) [ 1406.846676] QAT: Invalid ioctl 22:58:31 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:31 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:58:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000100000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:31 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:58:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000fffffe0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:31 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) [ 1407.074760] QAT: Invalid ioctl 22:58:32 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0)={0x3b9ac9ff}, 0x8}) 22:58:32 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000fffffff600004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000001000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:32 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:58:32 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x200, 0x0) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:32 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:58:32 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:32 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:58:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000097ffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a007fffffffffffffff00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:32 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:58:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) faccessat(r1, &(0x7f0000000100)='./file0\x00', 0x10, 0x800) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x10140) prctl$PR_MCE_KILL_GET(0x22) r2 = gettid() ptrace$peekuser(0x3, r2, 0x5) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x8, 0x600040) ioctl$VIDIOC_OVERLAY(r1, 0x4004560e, &(0x7f0000000180)=0xda) socket(0x5, 0x3, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:33 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000fff0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:33 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0)={0x9}, 0x8}) 22:58:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000001000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:33 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:58:33 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:33 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:58:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) r1 = dup2(r0, r0) r2 = getpgid(0xffffffffffffffff) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f00000000c0)=0xd4d9872ea88dddd6) getgroups(0xa, &(0x7f0000000b00)=[0xee00, 0xee00, 0xee01, 0xee01, 0xee00, 0xee01, 0xffffffffffffffff, 0xee01, 0x0, 0xee01]) sendmsg$unix(r1, &(0x7f0000000b80)={&(0x7f0000000840)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000a40)=[{&(0x7f00000008c0)="b1d928e75d41722b19ad29b118ae6a02f976e2f0f7f353c8a55722b31887bfa03fd7b148c2304c42c6a9dc320334c14949c50835d2e701c298e590493d3c0eb7a140942f1130bf134e1cd28a5d2a574363d063750f5fb1056279bc378c64a1f4ed90bb1248fba8c0f834f1b13e1ed18b2adac8203dbf8d58c3b925cbece75b625c6fcf0a3470ddee2666c6775b3eb18231660862ec72e9080a220ac23ce4867532d9a86c81be0d4524413f0d78f61e9a936495b414237f3f795769cf0b4f945371320b49306ebdfacc1177a04ae607397a8b29c6595b2cd8798b0972a5114b015289f41797804b420617fc3e2d699fd39d81243066ff2d", 0xf7}, {&(0x7f00000009c0)="20f57ff0468db81e551112787466ad0f2562a82703617a19f13a400b4a43315b2da086ccbc218913379b9e5a42134b3e196a7f9a6fa1bb41de93224287c2c6a693d42d10c6e32c6804b8f19edb88065ccdf58f12155669c1166b409975d34639f3e6", 0x62}], 0x2, &(0x7f0000000b40)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB=' \x00\x00\x00\x00@\x00', @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00'], 0x40, 0x8051}, 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r5 = accept$alg(r0, 0x0, 0x0) recvmmsg(r5, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:33 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000060000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:33 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:58:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000ffffff97004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:33 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:34 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0)={0x1000000000000000}, 0x8}) 22:58:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x1c, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000100)=0x7ff, 0x4) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:34 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:58:34 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000007400000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000230000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:34 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:58:34 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:34 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:58:34 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000006000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00002000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:35 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0)={0x10000000}, 0x8}) 22:58:35 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x404000, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x8000, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000280)=r1) socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) recvmmsg(r1, &(0x7f0000006040)=[{{&(0x7f00000002c0)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000340)=""/80, 0x50}, {&(0x7f00000003c0)=""/21, 0x15}, {&(0x7f0000000400)=""/180, 0xb4}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/84, 0x54}, {&(0x7f00000005c0)=""/3, 0x3}], 0x6, &(0x7f0000000680)=""/47, 0x2f, 0x3}, 0x2}, {{&(0x7f00000006c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000740)=""/166, 0xa6}, {&(0x7f0000000800)=""/109, 0x6d}, {&(0x7f0000000880)=""/37, 0x25}, {&(0x7f00000008c0)=""/98, 0x62}, {&(0x7f00000012c0)=""/4096, 0x1000}], 0x5, &(0x7f00000009c0)=""/137, 0x89, 0x9}, 0x6}, {{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000022c0)=""/4096, 0x1000}, {&(0x7f0000000a80)=""/220, 0xdc}, {&(0x7f00000032c0)=""/4096, 0x1000}, {&(0x7f0000000b80)=""/43, 0x2b}], 0x4, &(0x7f0000000c00)=""/81, 0x51, 0x5}, 0x6cdf}, {{&(0x7f0000000c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xf1d3}, 0x4}, {{&(0x7f0000000d00)=@nl, 0x80, &(0x7f0000000d80), 0x0, &(0x7f0000000dc0)=""/137, 0x89, 0x10001}, 0x1}, {{&(0x7f0000000f40)=@rc, 0x80, &(0x7f0000005380)=[{&(0x7f0000000fc0)=""/215, 0xd7}, {&(0x7f00000010c0)=""/107, 0x6b}, {&(0x7f0000001140)=""/222, 0xde}, {&(0x7f00000042c0)=""/172, 0xac}, {&(0x7f0000004380)=""/4096, 0x1000}], 0x5, &(0x7f0000005400)=""/162, 0xa2, 0x9}, 0x2f3}, {{&(0x7f00000054c0)=@nfc, 0x80, &(0x7f0000001240)=[{&(0x7f0000000e80)=""/26, 0x1a}], 0x1, &(0x7f0000005540)=""/56, 0x38, 0x3}, 0x8}, {{0x0, 0x0, &(0x7f0000005a00)=[{&(0x7f0000005580)=""/14, 0xe}, {&(0x7f00000055c0)=""/66, 0x42}, {&(0x7f0000005640)=""/100, 0x64}, {&(0x7f00000056c0)=""/128, 0x80}, {&(0x7f0000005740)=""/37, 0x25}, {&(0x7f0000005780)=""/107, 0x6b}, {&(0x7f0000005800)=""/173, 0xad}, {&(0x7f00000058c0)=""/55, 0x37}, {&(0x7f0000005900)=""/190, 0xbe}, {&(0x7f00000059c0)=""/17, 0x11}], 0xa, &(0x7f0000005ac0)=""/237, 0xed, 0x1}, 0x2}, {{0x0, 0x0, &(0x7f0000005fc0)=[{&(0x7f0000005bc0)=""/33, 0x21}, {&(0x7f0000005c00)=""/192, 0xc0}, {&(0x7f0000005cc0)=""/182, 0xb6}, {&(0x7f0000005d80)=""/147, 0x93}, {&(0x7f0000005e40)=""/119, 0x77}, {&(0x7f0000005ec0)=""/219, 0xdb}], 0x6, 0x0, 0x0, 0x9}}], 0x9, 0x1, &(0x7f0000006280)) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x4000, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f00000000c0)=0x4, 0x4) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r4 = accept$alg(r2, 0x0, 0x0) recvmmsg(r4, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x680, &(0x7f0000001180), 0x137, &(0x7f0000000100)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:35 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:35 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:58:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000fbffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a001c0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:35 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:58:35 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) mq_timedreceive(r1, &(0x7f0000000100)=""/36, 0x24, 0x1, &(0x7f0000000140)={0x0, 0x1c9c380}) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') 22:58:35 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:58:35 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00201000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:36 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0)={0x9000000}, 0x8}) 22:58:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000400000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:36 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:58:36 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00040000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:36 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:58:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f00000000c0)=0x7) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:36 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:36 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:58:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000600000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000048000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:37 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0)={0xfefdffff}, 0x8}) 22:58:37 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:37 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:58:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000fffffdf900004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000102000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:37 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:58:37 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:37 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:58:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000030000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:37 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) fchmod(r0, 0x46) r1 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x1f, 0x0) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={0xfe, 0x9, "c2e6cf5698f9258d006fec04f5f1ebef8d6bbab6db8f20eaebafed66ba06bb3f7fae6d00e0b906f99c57c6f96aaa4a8fe2ed5ff9137612cba6763e53b08b2c491cc6f78ed2164071b63952830de7504ad0d7e1769e2ad2b4e9116913c98b673e2e7637705ddf56ad8e6e3f81fd946a53e097f9b27eabc3f7a4560acd64ea1f5aa01e9007a0273e62d1374a4a3aab1c1b998b43beaea324fd49a645fcab36568efa08b57e6422d63f711ea4963cfe84af9fc2aefe09c52eb4cfd201588c876595bfe03f3d895eb03f031dcecf1cc576b727fd32bc7d27405235e2700dc8c9efe3dbd72a45593ac8d30b50301d175d69d2f9f6e6e3cf14"}, &(0x7f0000000300), 0x1000) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x10001, 0x1) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000100)={0x2, 0x80000000, 0x9, 0x401, 0xb6e, 0x5}) write$P9_ROPEN(r3, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x1, 0x3, 0x4}, 0x4}}, 0x18) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000060000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:38 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:58:38 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0)={0x3000000}, 0x8}) 22:58:38 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00fffffffb0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'\x00', {0x2, 0x4e23, @remote}}) r1 = accept$alg(r0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000000c0)={'syzkaller0\x00', {0x2, 0x4e23, @multicast2}}) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:38 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:38 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:58:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00002300000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:38 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}) 22:58:38 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:58:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000003f0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:38 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:58:38 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}) 22:58:39 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:58:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="1a5d789fe6d880a4f428a15d061b9a21928223d27a03de3bf8e148b9c8d0c436eb33c5b84c90373eb1953d26acf79eeac318bf2a0613032d824ff067404fac484cd7454f912a5eb313ba099c80e04bce40a8916d0b040b09f179195c4064de207167bb6ecc906784729f6d9182dab915d7f4c790e4f444f04c8a5285a4b0ee8818b3fa7f40fc01282b6496aaac24c4cd010261603855641bf0b97e67090356320756ad52cbaf63cd1f6925fbc3e6f846f0aac7a62e", 0xb5) 22:58:39 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0)={0x300}, 0x8}) 22:58:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000fff00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:39 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}) 22:58:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000074004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:39 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, []}) 22:58:39 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:58:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000ffffffe000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00ffffffffffffffff00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:39 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, []}) 22:58:39 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:58:39 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, []}) 22:58:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) r1 = semget(0x2, 0x0, 0x4d) semop(r1, &(0x7f0000000080), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:40 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0)={0x10}, 0x8}) 22:58:40 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:58:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000300004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000700000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:40 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x400000000000000) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x4, 0x60000, 0x8, 0x0, 0x400001}) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1f, 0x200000) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x6) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x430800, 0x0) connect$bt_sco(r2, &(0x7f00000000c0)={0x1f, {0x1, 0x3, 0x3, 0x6, 0x8, 0x4}}, 0x8) 22:58:40 executing program 2: r0 = socket$inet(0x2, 0x6, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in=@loopback, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}}}, &(0x7f0000000100)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'syzkaller0\x00', r1}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r3 = accept$alg(r2, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) bind$alg(r2, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) 22:58:40 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:58:40 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) 22:58:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000007fffffff00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000fffffffb00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:40 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0xffffffffffffff37}) r1 = mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2, 0x40010, 0xffffffffffffff9c, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0xc8, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0e630c400400000001000000000000000d63000012634840010000000000000000000000000000000000000011000000000000000000000028000000000000004000000000000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="852a747000000000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00'], @ANYBLOB="010000000000000000000000000000002600000000000000"], @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB="38000000000000000001000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000003800000000000000"], @ANYBLOB="2cce0000000000000b63000011634840020000000000000001000000000000000000000010000000000000000000000068000000000000001800000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB="8561646600000000060000000000000002000000000000003f00000000000000852a747000000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'], @ANYBLOB="0100000000000000000000000000000027000000000000008561646600000000020000000000000003000000000000001300000000000000"], @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB="300000000000000018000000000000001800000000000000"], @ANYBLOB="04000000000000000b63000008631040", @ANYRES64=r1, @ANYBLOB="0100000000000000"], 0x59, 0x0, &(0x7f00000003c0)="82321311ff43a31f69a152291e69a2ff8073c5119a0236c4a893e28dcbd938dbd8a2a2f2a0fed71e6b2fce6dc7386518357d6c81ae2b54759495fd0823862bb30ff1b532eec09d33a4ed072dfa3fdb9b72152b5c98c5512f2b"}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000480)=0x0) sched_getscheduler(r2) 22:58:40 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:58:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000200)={0x0, 0x100000001, 0x800, 0x8, 0x45b8a34e, 0x7}, &(0x7f0000000240)=0x14) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000280)={r2, 0x4d, "e3e4832b64a6a2339747bc288bb8874b4904fbf893c6143172802b38d0bcc10ec24b6043417cd8277dca7479ac7c20ddb0f46925721289c9126a5c5058ec171dbac73e96b9579f175e6276bf90"}, &(0x7f0000000300)=0x55) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r3 = accept$alg(r0, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000080)="49e9baafe5d99a80bf07cfb7ec1f961edfb2f03a4189122ad551a3e51be24904dd521a53be8a2af5dbbe747b790a49dcb2c1510108922c9f545b4edbe0d2efb7861218c732da7a84f933ce95faaa10ca70d88747831775c4244f482588453cd03067a892df23805f6a5f56a246bb6c36d2eb8796044c4c9b0c5471fda633772d0a2e00a0d94c525889223d5dd6d5e8891d9a266a64944103a4b3344489e324edbaaea8d1b438caf08c1421b80a10befc95ce3e93fe8248660da3f45822d8dc4a76a91b5732ad8e1cf707df8eb44e6be0417a6ebae22d3a256d4d1d7f0e4047c108b6ad0d5a03a0a30cc730863e99bc436a0fc57a63e70670e826610d732b9f27") 22:58:41 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0)={0xfefdffff00000000}, 0x8}) 22:58:41 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f00000002c0)={{0x3f}, 'port0\x00', 0x400000, 0xc0000, 0x0, 0x0, 0x0, 0x800000000000800, 0x2, 0x0, 0x3, 0xffffffffffffffff}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000180)=0x2, 0x4) r2 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video0\x00', 0x2, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x9) ioctl$VIDIOC_G_FMT(r2, 0xc0d05604, &(0x7f0000000080)={0x0, @sliced={0x3, [0x3, 0x8, 0x1, 0x59, 0xde000000000000, 0xc5c, 0x6, 0x5, 0x0, 0xffffffffffff9756, 0x8001, 0x4, 0xfffffffffffffff9, 0x3, 0x7, 0x1, 0x4016, 0x100, 0x3, 0x1, 0x7ff, 0xbd, 0x7ff, 0x6, 0x6, 0x8, 0x6, 0x0, 0x3, 0x8, 0x8, 0xff, 0x80000001, 0x1000, 0xffffffffffff48a7, 0x601a, 0x1, 0x100000001, 0x2, 0x97, 0x7644, 0x4, 0x4, 0xa811, 0x2, 0x7c0000000000, 0x101, 0x7], 0x6}}) 22:58:41 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:58:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00ffffff8c0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000000000006c004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:41 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x100, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000080)={{0x3, 0x10000}, {0x5, 0x6}, 0x0, 0x1, 0x3}) r1 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) 22:58:41 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:58:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000001c00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:41 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:58:41 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) r1 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c, 0x800) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={0x0, 0xffffffffffffffff}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000002c0)=ANY=[@ANYRES32=r2, @ANYBLOB="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"], &(0x7f0000000140)=0x1008) 22:58:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="6d0775b0800081e5b3b60ced1ca0bb6b", 0x5) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000004000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:42 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x20000148}) 22:58:42 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:58:42 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x800000000000000, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x80000000000}) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000540)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/136, 0x88}, {&(0x7f0000000000)=""/14, 0xe}, {&(0x7f00000002c0)=""/216, 0xd8}, {&(0x7f00000003c0)=""/92, 0x5c}], 0x4, &(0x7f0000000440)=""/233, 0xe9, 0x5}, 0x40) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000580)={0x0, 0x1, 0x9, 0xfffffffffffffff7, 0x4, 0x20, 0x9, 0x4, {0x0, @in={{0x2, 0x4e20}}, 0x7, 0x41a2, 0x0, 0x200, 0x733}}, &(0x7f0000000640)=0xb0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000680)={r2, 0xbc4c, 0x1, [0x0]}, 0xa) 22:58:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ppp\x00', 0x2000, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x4e20, 0x1, @empty, 0x8}, {0xa, 0x4e24, 0xff, @empty, 0x1000}, 0x40, [0x9, 0x7, 0x0, 0x8, 0x800, 0x100, 0x0, 0x2]}, 0x5c) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/46, 0x2e}, {&(0x7f0000000200)=""/120, 0x78}, {&(0x7f0000000280)=""/228, 0xe4}, {&(0x7f0000000380)=""/159, 0x9f}, {&(0x7f00000012c0)=""/4096, 0x1000}, {&(0x7f0000000440)=""/73, 0x49}], 0x6, &(0x7f0000000540)=""/110, 0x6e, 0xd2fb}, 0xe84a}], 0x1, 0x40000020, &(0x7f00000005c0)) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0xfd2a) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) getpid() 22:58:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000007a00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00230000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:42 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x2) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x3) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{0xfffffffffffffffd}, 'port1\x00', 0x0, 0x0, 0xffffffffffffffe1}) 22:58:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:42 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:58:42 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:58:42 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f00000001c0), 0x4) io_setup(0x3ff, &(0x7f0000000180)) io_setup(0xffffffff, &(0x7f0000000000)=0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x151100, 0x0) clock_gettime(0x7, &(0x7f0000000380)={0x0, 0x0}) utimes(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)={{0x0, 0x2710}, {r4, r5/1000+30000}}) io_cancel(r2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xf, 0x7, r0, &(0x7f0000000080)="f82f647d4494ab075b6474e34d7c9cdf49095a0f7dcc39381d7439", 0x1b, 0xff, 0x0, 0x1, r3}, &(0x7f0000000140)) 22:58:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000020000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:43 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x200002c8}) 22:58:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000000fff00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:43 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:58:43 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180), 0x0, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1, 0x0, &(0x7f0000000080)={0x77359400}) 22:58:43 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000300)='/dev/snd/seq\x00', 0x0, 0x0) flistxattr(r0, &(0x7f0000000080)=""/105, 0x69) r1 = socket(0x1, 0x6, 0x9) r2 = getpgid(0xffffffffffffffff) ioprio_get$pid(0x2, r2) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000000)={0x2, [0x92, 0xab8f]}, 0x8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) 22:58:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000023004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:43 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) epoll_wait(r1, &(0x7f0000000100)=[{}, {}], 0x2, 0x4) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x8, 0x140) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000080)={0x1ff, 0x10001, 0xe33, {}, 0x1, 0x1}) 22:58:43 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:58:43 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(aegis256)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:43 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:58:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000020000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000800000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:44 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:44 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x2a}) 22:58:44 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:58:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000003f00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000000000001f004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:44 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) r1 = dup2(r0, r0) getsockopt$inet_buf(r1, 0x0, 0x0, &(0x7f0000000000)=""/13, &(0x7f0000000080)=0xd) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) 22:58:44 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:58:44 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x80) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{0x80000000000}, 'port1\x00', 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 22:58:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000010000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000ffffff8c00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:44 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:58:44 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:44 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x400081, 0x0) r2 = geteuid() mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0xc4b96f5eff14a128, &(0x7f0000000140)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}], [{@uid_lt={'uid<', r2}}]}) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f0000000000)={0x8000000, 0xfffffffffffffff7, 0x25}) 22:58:45 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x9}) 22:58:45 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:58:45 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x5, 0x4) 22:58:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000fffffff600000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000fffffe0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:45 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400000, 0x0) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f00000000c0)={0x1, 0x0, [{}]}) 22:58:45 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:58:45 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0xfffffffffffff6f2, 0x301) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f00000000c0)={0x5, 0x2, 0x9, {0x77359400}, 0x444, 0x1f}) r1 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x1, 0x4, 0x0, 0xffffffff, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x3}) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x3, 0x400100) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000140)={0x7, 0xf4bd, 0x0, 0x3f, 0x6c8, 0x0, 0x1, 0x1, 0x0}, &(0x7f0000000180)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={r3, 0x1, 0x6}, 0xc) 22:58:45 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:58:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000008000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:45 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) r2 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x7, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x9, 0x1, 0x2, 0x1ff, 0x4}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000140)={r3, 0x8, 0x30, 0x4111, 0x1000}, &(0x7f0000000180)=0x18) syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x9, 0x400000) 22:58:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000004800000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:46 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x200000c8}) 22:58:46 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:58:46 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x80080) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) 22:58:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000007000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000500004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:46 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) pipe2(&(0x7f0000000280)={0xffffffffffffffff}, 0x84800) write$9p(r1, &(0x7f00000002c0)="1ef0dabc8e2defbf750e196886cb2b", 0xf) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$KVM_REINJECT_CONTROL(r3, 0xae71, &(0x7f00000000c0)={0xc6f6}) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000200)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r2, 0x40086424, &(0x7f0000000240)={r4, 0x2}) syz_kvm_setup_cpu$x86(r2, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text64={0x40, &(0x7f0000000100)="66b855000f00d0806600be0f073e460f0011c4c1c9d24537c744240001000000c7442402a6000000c7442406000000000f011c246566ad420f01cac4a121e996aac2ab9366bad104ed", 0x49}], 0x1, 0x0, &(0x7f0000000200), 0x0) r5 = accept$alg(r0, 0x0, 0x0) recvmmsg(r5, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:46 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:58:46 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x42, 0x0, 0x0, 0x0, 0x87}) 22:58:46 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:58:46 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x3ff, 0x40000) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="380000000807006bff759fe6da44d4882eb4c46ad02d64030f2fbfb30874e04f6c943704dcca1836e7df79f8f6008934a9fab33a0779cbb0f22a299c"], &(0x7f0000000100)=0x40) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000140)={r1}, 0x8) socket$alg(0x26, 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) lseek(r2, 0x0, 0x6) r3 = accept$alg(r2, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:46 executing program 0: syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x2000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e20, 0xfffffffffffeffff, @loopback, 0x2ff}], 0x1c) 22:58:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00050000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:47 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x20000108}) 22:58:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000003004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:47 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:58:47 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0xc00000) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x10040) r2 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x8911e54d64a2349a) write$P9_RAUTH(r1, &(0x7f00000000c0)={0x14, 0x67, 0x2, {0x3, 0x1, 0x6}}, 0x14) r3 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x4, 0x101000) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000140)={r2, r3, 0xffff, 0xe0000000000, &(0x7f00000002c0)="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", 0x1, 0x4, 0x9f, 0x0, 0x3f, 0x100000001, 0x7, "eeb5268a4a3fc40fd4468b1e16b0c2e73723bc3e1fc9ce2a4a97ef2b50cf34578898f405d456d1c289d2671d62a47af0ddb709b2fa4a83e45f3d"}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x6, 0x0, 0x0, 0xb3}) 22:58:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00070000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x4, 0x200000) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, r1, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000000c0)="88fa72c54d9abf0d0be4e50df562e171d8ffc311c1fc118db25dae01d6426140e670ed25312837c4c5d3c3026509f5bfdd5221a563735a8879b2e34a0749cd93fd1ff89e0fde68042929449deff7fe8b2220319f0c6cf3721e5c9e9bdfafd930be5fe658fa7e1c6c108443206fe14468dee8572197b5c82b72a093a1d6fc494fd0f75e3de1de8385434aad441f458450b20d75170198337db2a384f1ad4624f185931fd77f693295278240c1ed4603e506c1541adc58126767aeb5a6f67495cef430593a5d5319ba7a0a0664a7a768affce985feb7946a4dc6d35bea6841ef0a3f7a022365027389aba15bd1e00c", 0xee) r2 = accept$alg(r0, 0x0, 0x0) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f0000000200)) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:47 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x2, 0x805, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r1, 0x92) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)={r0}) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300), 0x4) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000100)=0x2, 0x4) sendto$inet(r1, &(0x7f0000000200)="e0", 0x1, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) r3 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1f, 0x141000) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r3, 0x54a3) r4 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x3ff) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r4, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) getsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f00000001c0)=0x8, &(0x7f00000002c0)=0x4) 22:58:47 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:58:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000e75004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00090000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:47 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:58:47 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000140)={{0x0, 0x9}, "706f727431000000000000000000000000000000000000000000000000000000000000000000000000000000000000e000", 0x2000000002, 0x110000, 0x0, 0x0, 0xc, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x9d}) r1 = getuid() r2 = getuid() stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@multicast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) r7 = getegid() r8 = getegid() lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000840)={{}, {0x1, 0x2}, [{0x2, 0x2, r1}, {0x2, 0x0, r2}, {0x2, 0x1, r3}, {0x2, 0x0, r4}, {0x2, 0x4, r5}, {0x2, 0x7, r6}], {0x4, 0x5}, [{0x8, 0x4, r7}, {0x8, 0x1, r8}, {0x8, 0x4, r9}, {0x8, 0x6, r10}, {0x8, 0x1, r11}], {0x10, 0x2}, {0x20, 0x2}}, 0x7c, 0x1) 22:58:48 executing program 1: openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000600)) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000080)={@my=0x0}) r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'vcan0\x00', 0x0}) connect$can_bcm(r2, &(0x7f0000000500)={0x1d, r3}, 0x10) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000440)) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x40e00, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r4, 0xc0e85667, &(0x7f0000000340)={0xc0000000, 0x10f, "72a5775b3c0031b9865e26ffa2ad1abedcdc15a454e8d1ae0fc393ad119d9a71", 0xa5, 0xffffffffffffff80, 0x8, 0x100000000, 0x20, 0x2598e270, 0x8, 0xec8, [0xb088, 0x9fe0, 0x6, 0x7]}) connect$vsock_dgram(r4, &(0x7f0000000280)={0x28, 0x0, 0x0, @my=0x0}, 0x4e1) shutdown(r0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) getsockopt$inet_sctp6_SCTP_RTOINFO(r5, 0x84, 0x0, &(0x7f0000000540)={0x0, 0xffffffff, 0x40, 0x1d2}, &(0x7f0000000580)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f00000005c0)={0x6, 0x8000000000020, 0x2, 0x9, 0xbfc, 0x4, 0x2, 0x4, r6}, 0x20) 22:58:48 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x3, 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f00000000c0)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:48 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:58:48 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x20000) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000040)={0x7c, 0xd8, 0x1, 'queue0\x00', 0x80000000}) 22:58:48 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00006800000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00001001000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:48 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:58:48 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0xc0000, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x0}]}) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, &(0x7f0000000100)={r1, 0x3}) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000140)=0x8001) r2 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) 22:58:48 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r2, 0x0) fsetxattr$security_evm(r1, &(0x7f0000000040)='security.evm\x00', &(0x7f0000000240)=@ng={0x4, 0xf, "76560db70ad38cc8cebf58f25af2eaee4c3144"}, 0x15, 0x1) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:58:48 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:58:48 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000013c0)={{{@in=@dev, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) quotactl(0x7, &(0x7f0000000000)='./file0\x00', r1, &(0x7f00000002c0)="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") 22:58:48 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00001000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000100004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:48 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:48 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:58:48 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0xd7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4}) 22:58:48 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:58:49 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{0x0, 0x4}, 'port1\x00'}) 22:58:49 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000ffe0000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:49 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000280)=@assoc_value={r4, 0x3}, 0x8) 22:58:49 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:58:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000001c00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:49 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80208000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x9c, r2, 0x110, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffffffff8d1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1ff}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffffffffff2b}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4994}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x400}]}, 0x9c}, 0x1, 0x0, 0x0, 0x4000800}, 0x20008080) 22:58:49 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x204000, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000140)={0x8000, 0x5, 0x4, 0x0, {r2, r3/1000+10000}, {0x2, 0x8, 0x3f, 0xfffffffffffffffe, 0x5, 0x8, "f3efc986"}, 0x7f, 0x1, @fd=r4, 0x4}) r5 = accept$alg(r0, 0x0, 0x0) recvmmsg(r5, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x7e, 0x5, [], [@ra={0x5, 0x2, 0x10001}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x7fff}, @hao={0xc9, 0x10, @remote}, @ra={0x5, 0x2, 0x5}, @jumbo={0xc2, 0x4, 0x3}]}, 0x38) 22:58:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000f4ffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:49 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:58:49 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{0x0, 0x1}, 'port1\x00', 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x2}) 22:58:49 executing program 0: umount2(&(0x7f0000000000)='./file0\x00', 0x9) r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) 22:58:49 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:58:49 executing program 2: socket$unix(0x1, 0x1, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000ffffffff00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:50 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) connect$vsock_dgram(0xffffffffffffffff, &(0x7f0000000400)={0x28, 0x0, 0x0, @host}, 0x313) shutdown(0xffffffffffffffff, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000240)={@host}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) connect$vsock_dgram(r2, &(0x7f0000000040)={0x28, 0x0, 0x2710, @my=0x1}, 0x10) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000003c0)=0x9) memfd_create(&(0x7f0000000340)='-\x00', 0x3) 22:58:50 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) write$binfmt_elf32(r0, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0xfd, 0x40000000, 0x2, 0x1, 0x0, 0x2, 0x6, 0x0, 0x140, 0x38, 0x45, 0x3, 0x3, 0x20, 0x2, 0x100000000, 0x80000000, 0x9}, [{0x60000000, 0x4, 0x9, 0x0, 0x7, 0x6, 0xffffffff80000000, 0x2d9}], "33806a8ead943485939f3305de11e3bcd82f382fb8db4159af6527aff36c13a343f732ad86339488a9eba2e5372e9499ecd4a33465c873cb81d73c90ca520950cb0118c1bbb0190ece9259311dac3fd8df6a5ecd528330c186ba14efeb8d0f72f7bb8d5b391e19b3e65f3b125d2ae2a32f07a7a5ae968d19a252b97733f0ff42797b4c13ef218e320fef2a9ab45fed4fbdfb79d2c9a6803ccdf9462af2b50c810f8e208216a4387055213ddef1592d711d6d8e344eccc26995fee533c65fd1e5030f22c202a9ee86bdc1a413657c337ef0c43c3b4622896c1e43fc87d7eb7e01955f0621b1822c754e81e3c02c3bb4a9f12cbee24b", [[], [], []]}, 0x44d) 22:58:50 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:58:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000300000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:50 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x4, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f00000000c0)={@multicast2, @multicast1, 0x0}, &(0x7f0000000100)=0xc) r3 = accept(r0, 0x0, &(0x7f0000000140)) bind$xdp(r1, &(0x7f0000000180)={0x2c, 0x1, r2, 0xc, r3}, 0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r4 = accept$alg(r0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000010000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:50 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:58:50 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x8201) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) 22:58:50 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:58:50 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x80000) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) 22:58:50 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r3 = getegid() r4 = getegid() stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) fstat(r2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() r10 = getegid() setgroups(0x8, &(0x7f0000000400)=[r3, r4, r5, r6, r7, r8, r9, r10]) r11 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r11, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r11, 0x0) pipe(&(0x7f0000000180)) 22:58:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000fffffff500000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:50 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x5, 0x400080) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f00000000c0)=""/187) 22:58:50 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x6c0080, 0x0) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f0000000200)={{0xf000, 0x0, 0x2a8adbce5df6a2d1, 0x8, 0xfffffffffffffff8, 0x2, 0x8000, 0xfffffffffffff2dc, 0x5, 0x906, 0x0, 0x2}, {0x6002, 0x4000, 0xe, 0x6, 0x42, 0x20, 0x67, 0x6, 0x2, 0x80000001, 0x7fffffff, 0x81}, {0x103000, 0x3000, 0xf, 0x1f, 0x8, 0x9, 0x5, 0xfff, 0x8, 0x4, 0x7, 0x1}, {0x10d000, 0x2004, 0xb, 0x100000000, 0x5, 0x401, 0x0, 0x5, 0x80000000, 0x5, 0x10001, 0x1000}, {0x4000, 0x0, 0xc, 0x6, 0x1, 0x7fffffff, 0x4, 0x1, 0x6, 0x3, 0x9}, {0x15002, 0x0, 0xe, 0x7, 0x6, 0x7fff, 0x1b, 0x60d, 0x1, 0xba8d, 0x6, 0x2}, {0x100004, 0x6005, 0xb, 0x10001, 0x4, 0x9, 0x7, 0x7, 0x3, 0x7, 0x6, 0x3}, {0x1000, 0x0, 0x4, 0xff, 0xffffffffffff8c40, 0x4, 0x83f, 0x3ff, 0x4, 0x9, 0x0, 0x100}, {0xf002, 0x1000}, {0x1, 0xf000}, 0x10009, 0x0, 0xd000, 0x102000, 0xa, 0x1000, 0xf002, [0x3, 0x3, 0x5, 0x805]}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:50 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:58:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00fcfdffff0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:51 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:58:51 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000080)={0x0, @aes128, 0x2, "aa36950bb5d06847"}) openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x80, 0x0) 22:58:51 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00006c00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:51 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:58:51 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x10103c) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000000)) write(r0, &(0x7f00000002c0)="fa0bd9e44dd6ba3c7e6e55d3de17a10d692f5d284968daeae1fd8b0b126161a104c169090d3629743525a96c7c11e9643b7e6e908916839ceac358f9e27a2c66ea904918023e636d689b24d3b05de76f07b0f1965a2cc299675c35f39330714a8ace2289088f821b6e02af98dba9dadfc014f7b37afc24459d369fa18105cc695976ae3f07ff53fbeb5f3d52f9ace74167bd08a1db5330d61cdfea5f480733d78fb5be4919ab3bc4a949bdc1c6c78d20dd9e51a5fdc3fcef0c3ea6d0abc0d73178e5916fb460a91e3089d4d25fcbc021d0774bd3", 0xd4) 22:58:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00fdfdffff0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:51 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:58:51 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x800, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@rand_addr, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000200)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000240)={@local, 0x5c, r2}) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r3 = accept$alg(r0, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:51 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000000000004c004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:51 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:58:51 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) 22:58:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00fbffffff0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:51 executing program 0: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000080)={0x10001, 0x8, 0x0, 0x4, 0x11, 0x1}) r1 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x200000000) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) 22:58:51 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:58:52 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000007ffffffffffff004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000070000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:52 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) open_by_handle_at(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="73000000e10000007f3aa633da9bfe5807ee9f7c4134f60328d93055f23be5ba812879f4c6586cfeb482be7e2604ce6d1386dabd85c04a5653fa0471953956a9f4b9ea136e8c28d69000cb27858ef90c4a23e64d7d61af1d3cf3580440630f0eda53c20a3083df57bcbf85fe4c0b999ffcd0d8"], 0x50300) getpeername$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14) fcntl$getownex(r1, 0x10, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa3}) 22:58:52 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:58:52 executing program 0: syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000080)={0x7, &(0x7f0000000000)=[{0x1, 0x7, 0x4}, {0x9, 0x6, 0x855f, 0x2}, {0x1000, 0x1, 0x5, 0x89d}, {0x3f, 0xfffffffffffffff7, 0x0, 0x8001}, {0x9, 0x2, 0x100000001, 0x8}, {0x9, 0x7f, 0x0, 0x1}, {0x9, 0x1, 0x10000, 0xfffffffffffffffd}]}) r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x3, 0x200000) mq_timedsend(r0, &(0x7f0000000100)="1ab1c1e672f6d5f063094bab6f4aea0e3e3462aea209f5466725a1e2155046d0c6c8164c6da0dc45f0e56765b108dedfe5c282510549ed94a34d3783cde9afe16b6b7b99ab431a66eece89e283eea29580d4", 0x52, 0x356, &(0x7f0000000180)={0x77359400}) 22:58:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x0, 0x2) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0xc348, 0x5, 0x8000}, 0x4) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:52 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000100000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:52 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:58:52 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000340)={@host}) r3 = socket$vsock_stream(0x28, 0x1, 0x0) inotify_init() r4 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x400000) ioctl$BLKGETSIZE64(r3, 0x80081272, &(0x7f0000000040)) connect$vsock_dgram(r3, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r3, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r4, 0x4008af60, &(0x7f00000001c0)={@hyper}) ioctl$TIOCSSOFTCAR(r4, 0x541a, &(0x7f0000000280)=0x6) pipe(&(0x7f0000000180)) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000380)={0xffffffff, 0x6, 0x4, 0x0, 0x0, [{r0, 0x0, 0x4}, {r2, 0x0, 0x894}, {r1, 0x0, 0xfff}, {r2, 0x0, 0x1000}]}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:58:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000040000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:52 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:58:52 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{0x4}, 'port1\x00', 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2}) 22:58:53 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r2 = fcntl$dupfd(r1, 0x0, r0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e23, 0x2, @empty, 0x8}], 0x2c) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r3, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fchmod(r4, 0x16) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000400)=ANY=[@ANYRES32=r4, @ANYBLOB="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"]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='trusted.overlay.upper\x00', &(0x7f0000001440)=ANY=[@ANYRESOCT=r5], 0x1, 0x6) 22:58:53 executing program 0: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00'}, 0x10) fallocate(r0, 0x50, 0xfffffffffffffeff, 0x5) r1 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) 22:58:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000040000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:53 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:58:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000200000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) readlink(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/241, 0xf1) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x22e701, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) fcntl$setstatus(r0, 0x4, 0x400) write$P9_RGETLOCK(r1, &(0x7f0000000180)={0x27, 0x37, 0x1, {0x2, 0x2, 0x800, r2, 0x9, 'skcipher\x00'}}, 0x27) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r3 = accept$alg(r0, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) fcntl$getownex(r3, 0x10, &(0x7f0000000240)) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000200)) r4 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x4, 0x101800) r5 = fcntl$getown(r3, 0x9) write$cgroup_pid(r4, &(0x7f00000000c0)=r5, 0x12) 22:58:53 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) write$apparmor_exec(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="01"], 0x9) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) flock(r1, 0x9) r2 = semget$private(0x0, 0x2, 0x20) semctl$SEM_INFO(r2, 0x0, 0x13, &(0x7f00000002c0)=""/4096) 22:58:53 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:58:53 executing program 0: ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000200)={{0x0, 0xfffffffffffffffd}, 'port1\x00', 0x0, 0x0, 0x5, 0x0, 0x2, 0xfffffffffffffffd, 0xffffffff98256953, 0x0, 0x0, 0x1}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x81880000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xc0, r1, 0x300, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x6e}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_DEST={0x54, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7fb9}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x101}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x99}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x80}, 0x20008014) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0286404, &(0x7f00000002c0)={0x0, 0x0, 0x7, 0x1, &(0x7f0000ffb000/0x3000)=nil, 0x8}) 22:58:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000068000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:53 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:58:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000edc00000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:54 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:58:54 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000180)={0x0, 0x8000}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000200)={r2, 0x2}, &(0x7f0000000240)=0x8) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f0000000140)={0x7fffffff, 0x8, 0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000080)={{0x101}, 'port1\x00', 0x0, 0x0, 0x0, 0x7, 0x0, 0x400000000}) 22:58:54 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:58:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00004c00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:54 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) sched_getaffinity(r1, 0x8, &(0x7f00000000c0)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) getrlimit(0xf, &(0x7f0000000180)) r2 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="cf4c751bdcbf4dcc0e7853d033a7c76a9ef0f6448db91284cbb311e9eabf669b5de4d57e39f8fa4031b441a88f32711adc542a88839c15724d9871476e481fe2abc1f512e3a53fc6", 0x48) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000102000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:54 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:58:54 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x6}) 22:58:54 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x24d) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x402000, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f0000000180)={0x29, 0x3, 0x0, {0x4, 0x8, 0x0, 'bdevppp0'}}, 0x29) r3 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f00000000c0)={'NETMAP\x00'}, &(0x7f0000000100)=0x1e) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:54 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000080)={0x8, 0x7ff, 0x7}) r1 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) 22:58:54 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:58:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000fffffffd004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:55 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:58:55 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x88, 0x120000, 0x0, 0x0, 0xffffffffffff8000}) 22:58:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000800004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x2d7) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:55 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:58:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000f5ffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:55 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) r1 = inotify_init() r2 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x1, 0x40000) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r2, 0x111, 0x3, 0x0, 0x4) r3 = getpgid(0x0) fcntl$getownex(r0, 0x10, &(0x7f00000005c0)={0x0, 0x0}) r5 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm-control\x00', 0x80, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a00)=0x0) fstat(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getegid() mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) sendmsg$netlink(r2, &(0x7f0000000b40)={&(0x7f00000002c0)=@proc={0x10, 0x0, 0x25dfdbfe, 0x800000}, 0xc, &(0x7f0000000980)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x198}, {&(0x7f00000004c0)={0xec, 0x40, 0x0, 0x70bd2b, 0x25dfdbff, "", [@nested={0xcc, 0x47, [@typed={0x14, 0x47, @str='%$]-mime_type-}\x00'}, @generic="a97409be872ea368e2ddad0da1bd3504f7a46fea36bb5a951ee0682a6dfed5ae322ec1f189fcc56691b370464ca6f7af714b4977fad68c84695152b3e810ea3f5e1d994f442303a3684ad26082d18a4eaf38fdab739dc64b0025d193f49d7cb09310ca453f06e712ff248f6fe20afc985f3e1c0c61fdcf3cf315627f1bece9790c66648cbd85f9024588cd83cdb70cf5f4d7cb856576d383a38753f695d53e3be40cab9ede44f3aa09b4d6001371ea065f5d"]}, @typed={0x10, 0x95, @str='/dev/ppp\x00'}]}, 0xec}, {&(0x7f0000000c00)=ANY=[@ANYBLOB="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", @ANYRES32=r3, @ANYBLOB="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", @ANYRES32=r4, @ANYBLOB="cc368eb6f47101c0a8e0300541680da34cd49db4a45984349f77979518bc117ae2cedbe0aafa8b7ac29fe1e665881f6d68bbd42f65f594a9c678a6844d968cdfa83780a84a5da3021be9a7afad8cf72ab2d93cc9c74fdaa7660c28817bc31a4321a9d2fab0bfc4758fc91f1a3a880d53456693fbad9516e502b97699a9c37b873b8ca5da7dea2a42702691529047cd3338370f8fc5570b5e9c57be4491e2c89e8ba36f92df69d0fd9fc2abc4fc126bd4dd0e107abb07ff7ce93f2774f9280000"], 0x364}], 0x3, &(0x7f0000000ac0)=[@rights={0x38, 0x1, 0x1, [r1, r1, r0, r0, r1, r5, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r6, r7, r8}], 0x58, 0x4}, 0x4000) getpeername$llc(r2, &(0x7f0000000b80), &(0x7f0000000bc0)=0x10) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0xfcb, 0x0, 0x6}) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000100)={{0xe8b, 0x3f}, 'port1\x00', 0x39, 0x1, 0x8, 0x9, 0xffffffff, 0xebe, 0x0, 0x0, 0x6, 0x6}) ioctl$VIDIOC_OVERLAY(r9, 0x4004560e, &(0x7f0000000080)=0x37) openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x220c0, 0x0) 22:58:55 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:58:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00004800000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00030000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:55 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x3}) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x2, 0x400) ioctl$TIOCNOTTY(r1, 0x5422) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000140)) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f00000000c0)=0x80) 22:58:55 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:58:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000004004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:56 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:58:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00080000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:56 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x2) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) 22:58:56 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:58:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000002300000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:56 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000200)={0x0, 0x0, 0x6, 0x0, [], [{0xffffffffffffffe1, 0x26457050, 0x5, 0x9, 0xf8b, 0x6}, {0x1, 0x200, 0xaeb, 0x9, 0x8, 0x18}], [[], [], [], [], [], []]}) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000000c0)={0x100}, 0x4) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) mlock2(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000440)={0xe, 0x5, 0x5, 0x1f, 0xc1, "af8166cc0e9d013893d689df4bcb8a609ab80c348b420fe39c855ccc27a115bd11fb43dd8b20c2a767a23b90f733a52e41353ff45eb49be2a5c0f2ddbdcdb4deb3ecfc4aebf59bc565300c16dc09d2fe42f9ca4f7406fef310cf5b9f0794cf9bf24748f3ce20afbe21b29e5475948ca1f1378f26c063c7b93a3f15fcbe234a3b31d6144791fb442145848d0db3ce2439c091fc0e6a5c6fef5c5dc1ac0d65724c71ccff1d4b84958d7fa0eb83648d3d9210949fa58d425f9adfdcec175cc79b97b6"}, 0xcd) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000140)={r3, r4/1000+30000}, 0x10) 22:58:56 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:58:56 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x80800) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4) r2 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000000c0)={0x6, 0x0, 0x3, 0x9, r3}, 0x10) 22:58:56 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:58:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000400004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:56 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{0x0, 0x3}, 'port1\x00', 0x1000000000000000, 0x0, 0x0, 0x0, 0x1, 0x80}) socketpair(0xb, 0x3, 0x981, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpgrp(0xffffffffffffffff) capget(&(0x7f00000000c0)={0x19980330, r2}, &(0x7f0000000100)={0xad, 0x2, 0xe57, 0x1000, 0x5, 0x100000000}) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000080), 0x4) socket$bt_rfcomm(0x1f, 0x3, 0x3) 22:58:56 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:58:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000040000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = gettid() ptrace$setopts(0x4200, r1, 0x7, 0x8) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) prctl$PR_SET_KEEPCAPS(0x8, 0x1) semget(0x1, 0x4, 0x26) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x2, 0x2) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x2) r3 = accept$alg(r0, 0x0, 0x0) setitimer(0x0, &(0x7f0000000080)={{0x0, 0x2710}, {0x77359400}}, &(0x7f00000000c0)) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) r4 = msgget(0x0, 0x20) msgctl$MSG_STAT(r4, 0xb, &(0x7f0000000200)=""/226) 22:58:57 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = dup3(r0, r0, 0x80000) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x2f, @broadcast, 0x4e21, 0x0, 'wrr\x00', 0x20, 0x2, 0x50}, 0x2c) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r2, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:58:57 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:58:57 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) socketpair(0x0, 0x2, 0x20, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bind$unix(r2, &(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f00000001c0)={0x2c, 0x7, 0x2, 0x2, 0x5, 0xfffffffffffffff7, 0x4, 0x102, 0xffffffffffffffff}) ioctl$VIDIOC_DBG_G_CHIP_INFO(r3, 0xc0c85666, &(0x7f0000000080)={{0x2, @addr=0x2542}, "31b3d53478933a74d60d440e20a163de934fd1a2076d04453e6cfd542b701162", 0x3}) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f00000002c0), &(0x7f0000000300)=0x4) 22:58:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000001c0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:57 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:58:57 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x458, 0x0, 0x258, 0x0, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000080), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @empty, @remote, @multicast1, 0xa, 0xffffffff}}}, {{@uncond, 0xf0, 0x118}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x6, 0x1, 0x2}}}, {{@uncond, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4a8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) r2 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x78d4, 0x1) ioctl$KVM_IRQ_LINE(r2, 0x4008ae61, &(0x7f0000000100)={0x1000, 0x1}) 22:58:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000010010000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00fffffff40000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:57 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:58:57 executing program 0: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000100)=0x0) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x401, 0x50000) syz_open_procfs$namespace(r0, &(0x7f0000000080)='ns/pid\x00') r1 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x2080, 0x0) ioctl$TIOCSBRK(r2, 0x5427) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) [ 1432.845106] Unknown ioctl 21543 22:58:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e594b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = getpid() waitid(0x3, r2, 0x0, 0x1, &(0x7f0000000480)) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) r3 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x7, 0x40) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x1000, 0x7, @scatter={0x4, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/26, 0x1a}, {&(0x7f00000000c0)=""/157, 0x9d}, {&(0x7f0000000200)=""/103, 0x67}, {&(0x7f0000000280)=""/79, 0x4f}]}, &(0x7f00000012c0)="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", &(0x7f0000000300)=""/144, 0xfff, 0x20, 0x3, &(0x7f00000003c0)}) r4 = dup3(r0, r0, 0x80000) ioctl$VIDIOC_G_STD(r4, 0x80085617, &(0x7f0000000000)) 22:58:57 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) [ 1432.893643] Unknown ioctl 21543 22:58:58 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) socketpair$unix(0x1, 0x200000000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r1, &(0x7f0000000280)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:etc_aliases_t:s0\x00', 0x23, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)) write(r3, &(0x7f0000000340), 0x10000014c) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000440), &(0x7f0000000480)=0x18) ioctl$LOOP_SET_FD(r3, 0x4c00, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r5 = socket$inet_dccp(0x2, 0x6, 0x0) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/mixer\x00', 0x44000, 0x0) write$selinux_attr(r6, &(0x7f0000000540)='unconfined\x00', 0xb) write$P9_ROPEN(r1, &(0x7f00000003c0)={0x18, 0x71, 0x1}, 0x18) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x0, @loopback=0x7f000002}, 0x10) getsockopt$inet_int(r5, 0x10d, 0x0, &(0x7f0000000140), &(0x7f0000000100)=0x4) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x20}, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r4+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000240)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000280)=@assoc_id=0x0, &(0x7f0000000340)=0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r7, 0x84, 0x1f, &(0x7f0000000380)={r8, @in={{0x2, 0x4e23, @loopback}}, 0x2, 0xee}, 0x90) openat$vnet(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000440)) r9 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r9, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r9, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCOUTQ(r10, 0x5411, &(0x7f0000000040)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:58:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00f6ffffff0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00001c5ee539c37d1f23004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:58 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x200, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000100)={0x6, &(0x7f00000000c0)=[{0x0}, {}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r2, 0xc010641d, &(0x7f0000000180)={r3, &(0x7f0000000140)=""/39}) 22:58:58 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x40000) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000140)={{}, 'port1\x00', 0x3, 0x0, 0x9752, 0x0, 0x0, 0x0, 0x20}) 22:58:58 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:58:58 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:58:58 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) getgroups(0xa, &(0x7f0000000040)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xee00, 0xee01, 0x0, 0x0, 0xffffffffffffffff]) r2 = getgid() r3 = getgid() getgroups(0x3, &(0x7f0000000080)=[r1, r2, r3]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) 22:58:58 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:58:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000006800000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:58 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x800) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) sendfile(r0, r0, &(0x7f0000000000)=0x36, 0x2) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) 22:58:58 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:58:59 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000040)=0x7) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000240)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r2, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:58:59 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/203, 0xcb}, {&(0x7f0000000200)=""/252, 0xfc}, {&(0x7f0000000300)=""/124, 0x7c}, {&(0x7f0000000380)=""/101, 0x65}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/198, 0xc6}], 0x6, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1, 0x0, &(0x7f00000001c0)={0x77359400}) 22:58:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00060000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:59 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) open(&(0x7f0000000000)='./file0\x00', 0x101000, 0x1db) 22:58:59 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:58:59 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000040004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:59 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000080)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) 22:58:59 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:58:59 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x4000, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000180)={0xa9, &(0x7f00000000c0)=""/169}) accept$alg(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000300)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000000340), 0x100005cf, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f0000000380)={0x0, 0x1c9c380}) 22:58:59 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000c0ed0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:58:59 executing program 2: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000002c0)=ANY=[@ANYBLOB="66696c92657200000000000000000000000000000000000000000000000000004c000000db9733e2a3b24e548f619a7888f20b50b2801cc6d94c7629053249f6d9c0806511e494132c7f625a92fa06c61e3ea9ac30f113424d715d2398faaa1aba16e6d542e4abd122d93bcc68bb7ad2"], &(0x7f00000001c0)=0x1) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x10, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)={@loopback}, &(0x7f0000001640)) fdatasync(r1) r2 = eventfd2(0x0, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r3, 0xb3d4) sendfile(r2, r3, &(0x7f0000000040), 0x2008004fffffffe) bind$unix(r3, &(0x7f0000000140)=@abs={0x1, 0x0, 0x4e24}, 0x6e) 22:58:59 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:59:00 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000240)={{0xa, 0x4e23, 0x599, @mcast2, 0x4}, {0xa, 0x4e21, 0x5, @loopback, 0x7f}, 0x1baa, [0x7, 0x7fff, 0xffffffffffffffff, 0x7, 0xfffffffeffffffff, 0x5, 0x0, 0x7]}, 0x5c) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:00 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x200000, 0x0) faccessat(r1, &(0x7f0000000080)='./file0\x00', 0x2, 0x400) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) 22:59:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00f5ffffff0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:00 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:59:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000011000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000780)={0x7}, 0x7) r1 = memfd_create(&(0x7f0000000400)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) setxattr$security_selinux(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000940)='security.selinux\x00', &(0x7f0000000540)='system_u:object_r:watchdog_device_t:s0\x00', 0x27, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r3, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x400000000002, 0x1200000000, 'queue1\x00', 0x7fffffff}) ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f0000000340)={0x19, 0x2, 0x9}) setxattr$trusted_overlay_nlink(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)='trusted.overlay.nlink\x00', &(0x7f00000008c0)={'L-', 0xfff}, 0x28, 0x2) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) fstatfs(r0, &(0x7f0000004200)=""/4096) ppoll(&(0x7f0000000640)=[{r2, 0x40}, {r3, 0x284}], 0x2, &(0x7f0000000680)={0x0, 0x1c9c380}, &(0x7f00000006c0), 0x8) 22:59:00 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:59:00 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400800, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r1, 0xc040563e, &(0x7f0000000080)={0x1, 0x1, 0x2, 0x2, {0x9, 0x1, 0xa3, 0x9}}) 22:59:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000004c000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:00 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:59:00 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x9, 0xffff}) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800410}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000328bd7000fbdbdf25060000004000020014000120fe8000200000000008000b000a0000000800040039000000080007000900e1c298a5162853000008000b000a00000000000000000000000000000000000000"], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x200000d0) r2 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) 22:59:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00002300000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:01 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) r3 = dup(r1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0xffffffffffffffff}, 0x30) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r3, 0xc1105518, &(0x7f0000000340)={{0x5, 0x1, 0x551, 0x1fc, 'syz0\x00', 0x7}, 0x0, 0x323, 0x1, r4, 0x2, 0x4, 'syz0\x00', &(0x7f0000000280)=['\x00', 'GPLsystem\x00'], 0xb, [], [0x3, 0x100000001, 0x8, 0x3]}) connect$vsock_dgram(r2, &(0x7f0000000100)={0x28, 0x0, 0x1000000, @my=0x0}, 0x10) shutdown(r2, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:01 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:59:01 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) socketpair$inet6(0xa, 0x0, 0x2, &(0x7f0000000000)) 22:59:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000780)={0x7}, 0x7) r1 = memfd_create(&(0x7f0000000400)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) setxattr$security_selinux(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000940)='security.selinux\x00', &(0x7f0000000540)='system_u:object_r:watchdog_device_t:s0\x00', 0x27, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r3, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x400000000002, 0x1200000000, 'queue1\x00', 0x7fffffff}) ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f0000000340)={0x19, 0x2, 0x9}) setxattr$trusted_overlay_nlink(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)='trusted.overlay.nlink\x00', &(0x7f00000008c0)={'L-', 0xfff}, 0x28, 0x2) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) fstatfs(r0, &(0x7f0000004200)=""/4096) ppoll(&(0x7f0000000640)=[{r2, 0x40}, {r3, 0x284}], 0x2, &(0x7f0000000680)={0x0, 0x1c9c380}, &(0x7f00000006c0), 0x8) 22:59:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000fffffdfc00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000fffffdfd004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:01 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:59:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00007fffffffffffffff004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:01 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) r1 = socket$inet6(0xa, 0x80000, 0xf97) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000000)={0x0, 0xffffffff}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000000c0)={r2, 0x8001}, 0x8) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x80002) 22:59:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000010000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:01 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xccab, 0x4002) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f0000000080)={0x13, 0x100, 0x4, 0x2, 0x1c, 0x2}) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f00000000c0)) r1 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) 22:59:01 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:59:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000004c00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000780)={0x7}, 0x7) r1 = memfd_create(&(0x7f0000000400)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) setxattr$security_selinux(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000940)='security.selinux\x00', &(0x7f0000000540)='system_u:object_r:watchdog_device_t:s0\x00', 0x27, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r3, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x400000000002, 0x1200000000, 'queue1\x00', 0x7fffffff}) ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f0000000340)={0x19, 0x2, 0x9}) setxattr$trusted_overlay_nlink(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)='trusted.overlay.nlink\x00', &(0x7f00000008c0)={'L-', 0xfff}, 0x28, 0x2) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) fstatfs(r0, &(0x7f0000004200)=""/4096) ppoll(&(0x7f0000000640)=[{r2, 0x40}, {r3, 0x284}], 0x2, &(0x7f0000000680)={0x0, 0x1c9c380}, &(0x7f00000006c0), 0x8) 22:59:02 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r2, 0x5381) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00001c00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:02 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_buf(r0, 0x107, 0x1, &(0x7f00000000c0)="5c0ea7bcdcb076babcdd9e96ef7d34a503c6fab5265e92", 0x17) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x101180) write$binfmt_aout(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="080103071c020000b502000008000000af0000000600000000000000000000004a0c8bf579b7e663749396bcd9a7f0bf05e926391fbe076cccc58a348116c58b18c3450f6620d8de419eef77bece4aa73c46c0131200bafffba104066153e2d46837620028dbd1ef9b11722d34206f8279e3c7a112e40cb1f138c90e4d59532ca62fe9a873cafb693290bdd20b5e1b70128b4acbe4f34d5ff41f5074b54c5701b6123accf28a435158e24f614939bee4abd53bde45839531ea18d0dc8752ba2b33e8d6b60366ddcd1ba2d81f94821e05f64b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000553e000000000000000000000000000000f6ffffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000047000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000063556d261a549fe0f37781a81ba90cfbb788a4361bda7315fa1dc5a79dc5f7120517e4627fdd77"], 0x4d2) r2 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0xdfac}) ioctl$TIOCCBRK(r1, 0x5428) 22:59:02 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:59:02 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:59:02 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:59:02 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x200000) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) 22:59:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000001f00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:02 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:59:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='\x00\x00\x00\x00\x00') openat$cgroup_ro(r0, &(0x7f0000000000)="6d656d00017937737761532e63757289c942abe3fa72656e7400", 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='fd/4\x00') write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 22:59:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00ffffffffffffff7f00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:02 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f0000000080)=0x4, 0x4) r1 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, &(0x7f0000000100)=0x8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) 22:59:03 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r2, 0x0) r3 = fcntl$dupfd(r1, 0x406, r1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e21, @local}}, 0xcb3, 0x100000000, 0x1, 0x800, 0x2}, &(0x7f0000000240)=0x98) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000740)="0c3cef2a435149cb76881922fa4b29a6", 0x10) ioctl$ASHMEM_SET_PROT_MASK(r3, 0x40087705, &(0x7f0000000280)={0x80, 0x4}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000005c0)=0xe8) fstat(r3, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r3, &(0x7f00000006c0)={0x78, 0x0, 0x2, {0x3, 0x80000000, 0x0, {0x5, 0x101, 0x5, 0x4, 0xffff, 0x2, 0x9, 0xfff, 0x81, 0x8, 0x80000001, r5, r6, 0x8}}}, 0x78) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000400)={r4, @in6={{0xa, 0x4e21, 0x5, @empty, 0x101}}, 0x4, 0x7fffffff}, 0x90) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:03 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:59:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000900004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:03 executing program 2: mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000003, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000080)={"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"}) r0 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000040)='9', 0x1}], 0x1, 0x881806) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000500), &(0x7f0000000540)=0x4) read(r0, &(0x7f0000000200)=""/30, 0x10000038b) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000480)=""/71) 22:59:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000001c000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:03 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x42, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000100)=0x1) write$FUSE_IOCTL(r0, &(0x7f0000000080)={0x20, 0x0, 0x1, {0x55e, 0x0, 0x0, 0x7}}, 0x20) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{0x4}, 'port1\x00', 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}) 22:59:03 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:59:03 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x100, 0x0) 22:59:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000600000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000200004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:03 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000140)={{}, 'port1\x00', 0x0, 0x0, 0x1}) 22:59:03 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:59:04 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0105303, &(0x7f0000000200)={{}, 'port1\x00'}) 22:59:04 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) r0 = gettid() move_pages(r0, 0x2, &(0x7f0000000040)=[&(0x7f0000001000/0x4000)=nil, &(0x7f0000003000/0x4000)=nil], &(0x7f0000000080)=[0x6, 0x4, 0x7fff, 0x2, 0x4, 0x8, 0x7c5ef351, 0x2, 0x7, 0x10001], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6) 22:59:04 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:59:04 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0xffffffff00000001) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0xfffffffffffffffb) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000fdfdffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:04 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00001c00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:04 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x117, 0xb}}, 0x20) setxattr$trusted_overlay_redirect(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x3) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000100)={0x5, 0x10, 0xfa00, {&(0x7f00000002c0), r2, 0x1}}, 0x18) 22:59:04 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:59:04 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x0, 0x0, @remote, 0x3f}}}, 0x98) 22:59:04 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:59:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000023004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000600000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:04 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000003f00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:04 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:59:04 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='schedstat\x00') getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0x7}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000100)={r2, 0x1, 0x7, [0x1, 0x9, 0x0, 0x0, 0xb5, 0x1, 0x0]}, &(0x7f0000000140)=0x16) 22:59:05 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x800, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:05 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:59:05 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x6, 0x20100) mq_notify(r0, &(0x7f00000002c0)={0x0, 0x7, 0x2, @thr={&(0x7f0000000080)="3477e9775672a07d6fd04c937ab12daaf78a653ec3570f4ba4bc84de258e0f2f6041dce4615ec22fe80a51ffad3c25f1cd48c2f77b62830c08dac006db3bed08fcaea04eb88698d1aeb0edd55140ef114148d1885178984325d328d2b8477533850a0752683c4214c90b", &(0x7f0000000100)="74d27cd8a154b1b8a422b1bb45892c007e1e55fc3778b89defc1ce0ffe343f42140499991b0e1680e7684c263687000ca89fae93dd1ebb7b5dc0e142a64d9366f8675086225af76010beed87c3c551f9c279cc5fca62927cc56bde49be50a499a36fbccbe127fe69ae4ab2216092ab7aca85bf8ae6374c65764b2783122fef2c4dc055a217237803f8994a8ba9834cc806f8a0ad1c132f06f36d7fbbf79069b22f032c450fedcf0b3318d134f9ca43ed393aea73a5b8bffc332810d9eb837497f1b16815338212b24efa890640"}}) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) 22:59:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00fffffff40000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000fffffdfc004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000e0ff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:05 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:59:05 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0xa80, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080)={0x400}, 0x4) r1 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) 22:59:05 executing program 0: r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x7fffffff, 0x30}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000180)={r1, 0x8001}, 0x8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x2) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r3, 0xc0105303, &(0x7f00000001c0)={0xfffffffffffffffb, 0x2032, 0x3}) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000080)=0x3, 0x4) 22:59:05 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:59:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000006004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:05 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$RTC_UIE_OFF(r1, 0x7004) 22:59:06 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'bpq0\x00', 0x100}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r3, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r3, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r2, 0xc008551a, &(0x7f0000000040)={0x1, 0x14, [0x7fff, 0x80, 0xffffffffffffffff, 0x3, 0xf628]}) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:06 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:59:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000001f000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:06 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x4) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) 22:59:06 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000003000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:06 executing program 0: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000480)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000340)='security.capability\x00', &(0x7f00000004c0)=@v3={0x3000000, [{0x10001, 0xffffffffffffff1d}, {0x5f1a, 0xbd}], r1}, 0x18, 0x1) r2 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x2) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r5) fgetxattr(r4, &(0x7f00000001c0)=@known='trusted.syz\x00', &(0x7f00000002c0)=""/52, 0x34) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000080)={0x0, 0xad, "fe274c854decbee2588125c7f251695737bde676f145643323391c2e3c4ad34ff4bd234da5b24372cb1c62d431cda4da10923a8b04946a33a597b7b5da3059cb66eebcc69b27d69a193eef697d16db1e7d800d79376c90e8283d8e5422908772b48622fa0cba7ef53db04933545268d8b6be85e4b6687488f2ac05b48e2037c23288f540fa14be9bae92a7d48c8d471b0a1e456fa1293132db41e3bd1b98ebb1600fcd6990adc48cf4745ddcd1"}, &(0x7f0000000140)=0xb5) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000180)={r6, 0x4}, 0x8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) 22:59:06 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:59:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000005000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000400004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:06 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40, 0x0) syncfs(r1) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) 22:59:06 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:59:07 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f66696c65302021776c616e30202f6465762f76686f73742d6e657400202f6465762f76686f73742d6e6574000a508883e4b2ca1600d6791843939c32b078e7fa36348b880dfa31aa97f2248115509cc54c1400ff351d63ce8ea96ec56d521d0c51cf2231ac11784be74cdefde463e0cdfa4c168e6d238a30a41d5e99d57ece16ac1316961beeae3c62c335c8bcf294ce885f1ad0d19fde0f9fa638dcaeff76292ceac9e3724f4ceeba7daa"], 0xb0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xffffffffffffff01) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000280)={0x3ded406d, 0x0, 0x1, r2}) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000080004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:07 executing program 0: r0 = dup(0xffffffffffffff9c) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={0x0, 0x6}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000000c0)={r1, 0xfffffffffffffffa, 0x17, "432404b91cca777c4e9d90071235dbb23d94b2504a47b7"}, 0x1f) r2 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x400) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) 22:59:07 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:59:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000c0ed0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:07 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x80080) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) 22:59:07 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:59:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x359, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) 22:59:07 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x20000, 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000080)) r1 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) 22:59:07 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:59:07 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000480)='/dev/snd/seq\x00', 0x0, 0x430001) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/snmp\x00') r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000100)={{{@in=@multicast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@multicast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in6}}, &(0x7f0000000400)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f00000005c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000640)={@rand_addr, @rand_addr, 0x0}, &(0x7f0000000680)=0xc) accept$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000700)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000900)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="60010000", @ANYRES16=r2, @ANYBLOB="100b06000000fcdbdf250300000008000100", @ANYRES32=r3, @ANYBLOB="7c0002003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r4, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="c0000200400001002400010071756575655f696400000000000000000000000000000080000000000800030003000000080004000700000008000600", @ANYRES32=r7, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b000000080004008b47000008000700000000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008130600", @ANYRES32=r8], 0x160}, 0x1, 0x0, 0x0, 0x8000}, 0x4000004) 22:59:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000fffffdf9004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:08 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x2710, @host}, 0x10) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:08 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:59:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000005004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:08 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x0, 0x30}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0)={r1, 0x1, 0xbde8, 0x0, 0x7, 0x7f}, 0x14) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{0x0, 0x7}, 'porZ1\x00', 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xcaf, 0x0, 0xffffffffffffffff}) ioctl$void(r0, 0x5451) 22:59:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000090000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000ffffffff004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:08 executing program 0: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x402, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f00000003c0)=""/158) openat$vhci(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhci\x00', 0x40, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000600)=""/95) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) msgrcv(r1, &(0x7f0000000340)={0x0, ""/101}, 0x6d, 0x3, 0x1000) r2 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) 22:59:08 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:59:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000400000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:08 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:59:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000edc000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000006c00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:09 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x40000, 0x0) splice(r1, &(0x7f0000000440), r0, &(0x7f0000000480), 0x0, 0x2) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000340)={0x0, @in6={{0xa, 0x6996, 0x6, @ipv4={[], [], @remote}, 0x1}}, 0x9, 0x5, 0xffffffffffff7fff, 0x40, 0x10}, &(0x7f0000000280)=0x98) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000400)=@assoc_id=r2, 0x4) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r3, &(0x7f0000000040)={0x28, 0x0, 0x0, @hyper}, 0x10) shutdown(r3, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:09 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:59:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000800000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:09 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000074000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000800000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:09 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:59:11 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) r1 = semget(0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) semtimedop(r1, &(0x7f0000000000)=[{0x3, 0x5, 0x1800}, {0x2, 0x3, 0x1000}, {0x4, 0x956, 0x1800}, {0x0, 0xff, 0x800}, {0x0, 0x912, 0x1000}], 0x5, &(0x7f00000000c0)={r2, r3+30000000}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) 22:59:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000400004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000600000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:11 executing program 1: openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r0, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:11 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf}) 22:59:11 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:59:11 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:11 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:59:11 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:11 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x10000) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) 22:59:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000fffffff4004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000006000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:11 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:59:11 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) 22:59:11 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:59:11 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) 22:59:11 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:59:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000009000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000001c000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:12 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x1, 0x1ff}, 'port1\x00', 0x4, 0x10, 0xffffffff7fffffff, 0x2000000000000, 0x400, 0x6cc, 0x10001, 0x0, 0x2, 0xfffffffffffffffa}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer\x00', 0x4100c0, 0x0) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(r1, &(0x7f0000002a40)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000002a00)={&(0x7f0000002a80)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="08001700", @ANYRES32=r0, @ANYBLOB="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"], 0x24c8}, 0x1, 0x0, 0x0, 0x4000080}, 0x1) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000340)={0x0, 0x7f, 0x7}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000003c0)={r3, 0xfffffffffffffffe}, &(0x7f0000000400)=0x8) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x88000, 0x0) msgget(0x2, 0x109) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$BLKRESETZONE(r4, 0x40101283, &(0x7f0000000140)={0x3, 0x1}) 22:59:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363affffffffffffff7f0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:12 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000240)={0x7fff, 0x4, 0x1ff, 0xdd}, 0x14) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r3, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r3, 0x0) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000480)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8400}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)=ANY=[@ANYBLOB="90000000", @ANYRES16=r4, @ANYBLOB="0c002bbd7000fddbdf25010000000c00040001000000000000000c00070008000100", @ANYRES32=r0, @ANYBLOB="08000100000000000c08050000010000000000001400070008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="0c0008001f000000000000000c00020004000000000000000c00050002000000000000000c00060002000000000000000c0003000100000000000000"], 0x90}, 0x1, 0x0, 0x0, 0x40000}, 0x4800) pipe(&(0x7f0000000280)) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000400)=0x3) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000600)=[@in6={0xa, 0x4e22, 0x1, @mcast1, 0x80000001}, @in6={0xa, 0x4e24, 0x3, @remote, 0x3}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e21, @rand_addr=0x5}, @in6={0xa, 0x4e20, 0x6, @mcast1}, @in6={0xa, 0x4e23, 0x10001, @local, 0xaf57}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}], 0xa0) ioctl$KVM_GET_XCRS(r5, 0x8188aea6, &(0x7f0000000340)=ANY=[@ANYBLOB="090000000500000002000000000000000010000000000000070000000000000001040000000000000500000000000000f9ffffffffffffff070000000000000006000000000000000000000000000000030000000000000000000000000000000000000000000000d9000000000000000000000000030000000f0000ef558f2b20a6344a000000000000000000000000ffffffffffffffff"]) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:12 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:59:12 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{0x3}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}) 22:59:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00007400000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000edc000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:12 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:59:12 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000}) 22:59:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a7fffffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:12 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:59:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000fffffdfd00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00002010000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:13 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:59:13 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:13 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000080)={0x1, 0x0, 'client0\x00', 0x3, "abcb313b71b30c5c", "a5de4f9f17e9aa1b73e9fd35b4889b3601602493c8a67e3c1c0332e9e0708ebb", 0x2, 0x8}) 22:59:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000fffffffb004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:13 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:59:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000fffffdf9004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:13 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:13 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:59:13 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) memfd_create(&(0x7f0000000080)='port1\x00', 0x1) 22:59:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00007fffffffffffffff004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000fff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:13 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:59:13 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000002b40)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) sendmsg$rds(r1, &(0x7f0000002e80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/163, 0xa3}], 0x1, &(0x7f0000002c00)=ANY=[@ANYBLOB="30000000000000001401000003000000", @ANYPTR=&(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='a\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00'], @ANYBLOB="200000fcff000000560000000000000014060000190000000080000024eb0000", @ANYPTR=&(0x7f0000000300)=ANY=[@ANYBLOB='`h\x00\x00\x00\x00\x00\x00'], @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB='M\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="060000000000000000080000000000008000000000000000faffffffffffffff2e00000000000000018000000000000058000000000000001401000009000000ff00000092090000", @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB="0200000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="080000000000000005000000000000004000000000000000ca8500000000000014000000000000002946000000000000580000000000000014010000090000002741000003000000", @ANYPTR=&(0x7f0000000400)=ANY=[@ANYBLOB="ff00000000000000"], @ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB="0100000000000000"], @ANYBLOB="050000000000000007000000000000000800000000000000fbffffffffffffff0400000000000000010400000000000030000000000000001401000003000000", @ANYPTR=&(0x7f0000000480)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0010000000000000", @ANYPTR=&(0x7f0000001480)=ANY=[@ANYBLOB='\x00'], @ANYBLOB="020000000000000018000000000000001401000002000000000000050700000030000000000000001401000003000000", @ANYPTR=&(0x7f00000014c0)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000001500)=ANY=[@ANYBLOB='\x00'], @ANYBLOB="0900000000000000580000000000000014010000080000000100000000000000", @ANYPTR=&(0x7f0000001540)=ANY=[@ANYBLOB="f301000000000000"], @ANYPTR=&(0x7f0000001580)=ANY=[@ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0000000000000000070000000000000006000000000000000002000000000000000000000000000009000000000000001800000000000000140100000c0000000200000000000000480000000000000014010000010000000000008009000000", @ANYPTR=&(0x7f00000015c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0010000000000000", @ANYPTR=&(0x7f0000002ec0)=ANY=[@ANYPTR=&(0x7f00000025c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="bc00000000000000", @ANYPTR=&(0x7f0000002680)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="a700000000184112d46a12c5d17d1ffddc0491c367fa92eeb349710278f8d41fd0a64bb6c179a0d786629341124f4f78234874e96aad906a04534fc0a88da111e87bac68819f673521f27c6e58d8", @ANYPTR=&(0x7f0000002740)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='=\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000002780)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="fc00000000000000", @ANYPTR=&(0x7f0000002880)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='z\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000002900)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="1c00000000000000", @ANYPTR=&(0x7f0000002940)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="a400000000000000", @ANYPTR=&(0x7f0000002a00)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='*\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000002a40)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="d100000000000000"], @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x000\x00\x00\x00\x00\x00\x00\x00\t\x00\x00\x00\x00\x00\x00\x00'], 0x268, 0x800}, 0x40440c0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) 22:59:14 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x10000, 0x0) inotify_add_watch(r2, &(0x7f0000000240)='./file0\x00', 0x4000000) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:14 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:59:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000020004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:14 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x100) ioctl$VT_DISALLOCATE(r1, 0x5608) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)) 22:59:14 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000300000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:14 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00'}) 22:59:14 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:59:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363afbffffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:14 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x8000) r1 = fcntl$dupfd(r0, 0x406, r0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f00000002c0)={@ax25={0x3, {"43f53639dcaf94"}, 0x2}, {&(0x7f0000000040)=""/203, 0xcb}, &(0x7f0000000140), 0x10}, 0xa0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, 'port1\x00'}) 22:59:14 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00007fffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:14 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:59:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:15 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:59:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000100004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:15 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000001f00"}) 22:59:15 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x900}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:15 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000780)={&(0x7f0000000240)=@in={0x2, 0x4e24, @multicast2}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000340)="2ec996b50950f255f9dcca436f7f16d1724fd2f8411b9862afe1eea0f4efb3cbec0788f228e2c7b825775bf9e574c028818f3e67e3858ad4a5adc46601c2705f1bdaac5853d01461b53afb792fd0dec17452d9e3a512d7e7350d1bbf9778035c66dcfc63c44a997381c4f0f860185b2b9e606e827bdfc5318496f6491d684fdbe6b870bd4f04b53b8407a8f3c1e5", 0x8e}, {&(0x7f0000000040)="e8de0f932942184243d65e653cd59fd0e615cf9bfc33b1b2fb2074983a2a62a63642f2852286b86aec", 0x29}], 0x2, &(0x7f0000000440)=[{0x110, 0x6, 0x5, "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"}, {0x80, 0x6, 0x2, "1428629e0303980a11a92d9bbf55fa9b0128125e1b3247ea4eec55748c40945780ec2a457431432d89aa77f72cbd28be1df8226f42e5982fcc9c55d3e257e9f78a3c1c54d8da47e0003f4307da5af025cf79bed6ec4743ee4a57b96daa4f33e3c013680da99b7f5ed880340b"}, {0x70, 0x19d, 0x2, "09354348d11e2e3e3dc1a168df4b5ac512c227da1f4687eea1a5c55981c13843e94c428f9a9287aa9131acfb2f9b7548c1c61c2d2621b8c9156cfdc35667823e715de6f3ea8ffa09afbb9019df5ccc557a9f64085593176d9920d30a156977"}, {0xb0, 0x11f, 0x4, "f6a3afa9a27769dc112039d76e865bfada30e73ff1f61a816dccdaf44a54123db17600a9206984c12e7075f4e3bcf00e1a0ec0529dc04d2e3544b317df864f51fa3d2bc6702c662f984beba5d02d20bd105b43cc3f603b5d7218a05662e97f9e58b1346bbbb5850641b7c6a0b3b200d82e50cbb545cdfcc807556aa855e0c2536ea5c147da4fd610bd566bd3dba4eb34ed036ee5be361f805a42"}, {0x60, 0x11f, 0x8, "585daeeddd52215de3af4abea70cffa6bd0a70091ca83cba23c7bf9a63838878818e270f090c5f6f6e40cc0fd8316f4069522b2cfce5200f84c726f06fff3aae123b16d8083b9a4dda9b40043ad98dcb"}], 0x310, 0x84}, 0x4) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r3, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) fcntl$dupfd(r2, 0x0, r3) shutdown(r3, 0x0) munlockall() pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000500000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:15 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:59:15 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:59:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000200000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000fdffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:15 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:59:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000006000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000fff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:16 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:59:16 executing program 0 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) [ 1451.740162] FAULT_INJECTION: forcing a failure. [ 1451.740162] name failslab, interval 1, probability 0, space 0, times 0 [ 1451.751851] CPU: 0 PID: 21572 Comm: syz-executor0 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 1451.760463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1451.769848] Call Trace: [ 1451.772442] dump_stack+0x244/0x39d [ 1451.776101] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1451.781312] ? debug_smp_processor_id+0x1c/0x20 [ 1451.786009] ? perf_trace_lock+0x14d/0x7a0 [ 1451.790254] should_fail.cold.4+0xa/0x17 [ 1451.794309] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1451.799426] ? lock_downgrade+0x900/0x900 [ 1451.803578] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1451.809164] ? proc_fail_nth_write+0x9e/0x210 [ 1451.813677] ? find_held_lock+0x36/0x1c0 [ 1451.817785] ? perf_trace_sched_process_exec+0x860/0x860 [ 1451.823272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1451.828837] __should_failslab+0x124/0x180 [ 1451.833074] should_failslab+0x9/0x14 [ 1451.836902] __kmalloc+0x2e0/0x760 [ 1451.840434] ? strncpy_from_user+0x5a0/0x5a0 [ 1451.844857] ? fput+0x130/0x1a0 [ 1451.848145] ? do_syscall_64+0x9a/0x820 [ 1451.852118] ? __x64_sys_memfd_create+0x142/0x4f0 [ 1451.856953] ? do_syscall_64+0x9a/0x820 [ 1451.860931] __x64_sys_memfd_create+0x142/0x4f0 [ 1451.865596] ? memfd_fcntl+0x1910/0x1910 [ 1451.869689] do_syscall_64+0x1b9/0x820 [ 1451.873610] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1451.878975] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1451.883899] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1451.888765] ? trace_hardirqs_on_caller+0x310/0x310 [ 1451.893784] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1451.898796] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1451.903812] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1451.908660] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1451.913853] RIP: 0033:0x457569 [ 1451.917036] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:59:16 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000440)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000340)={0xc8, r2, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80000000}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x65}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x947}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x400}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0xc8}, 0x1, 0x0, 0x0, 0x4040000}, 0xc0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r3, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r3, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$VIDIOC_S_FMT(r4, 0xc0d05605, &(0x7f0000000540)={0xb, @win={{0x100000000, 0x8, 0x10000, 0x7}, 0xb, 0x0, &(0x7f0000000480)={{0xffffffffffff5ed6, 0xfffffffffffffffc, 0x10001, 0x3}}, 0x4, &(0x7f00000004c0)="a019375a7a5bb581529c6a864ba55ea74c2d2c40e60695868b21c9b985cf0653dddfc9088859e29a2b6f0b82d0632e4e1fd13c9f21bdcba87043b2f3428be3b0aef40060068528cbf4968fc177e41bfb94ee4f3eebfe1e2f114242b97b6fa70c", 0x3}}) socket$bt_rfcomm(0x1f, 0x3, 0x3) 22:59:16 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:59:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000ffffff9700000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:16 executing program 2 (fault-call:1 fault-nth:0): r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, 'port1\x00'}) 22:59:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000020000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:16 executing program 0 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) [ 1451.935953] RSP: 002b:00007f2a4600ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1451.943695] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000457569 [ 1451.950969] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc787 [ 1451.958247] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1451.965537] R10: 0000000020000200 R11: 0000000000000246 R12: 00007f2a4600f6d4 [ 1451.972814] R13: 00000000004c5122 R14: 00000000004d8ef0 R15: 0000000000000003 22:59:16 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, 'port1\x00'}) 22:59:16 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) [ 1452.130425] FAULT_INJECTION: forcing a failure. [ 1452.130425] name failslab, interval 1, probability 0, space 0, times 0 [ 1452.147848] CPU: 0 PID: 21590 Comm: syz-executor0 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 1452.156515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1452.165909] Call Trace: [ 1452.168506] dump_stack+0x244/0x39d [ 1452.172140] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1452.177362] ? debug_smp_processor_id+0x1c/0x20 [ 1452.182072] ? perf_trace_lock+0x14d/0x7a0 [ 1452.186326] should_fail.cold.4+0xa/0x17 [ 1452.190399] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1452.195536] ? perf_trace_lock+0x14d/0x7a0 [ 1452.199776] ? __lock_acquire+0x62f/0x4c20 [ 1452.204013] ? lock_downgrade+0x900/0x900 [ 1452.208169] ? check_preemption_disabled+0x48/0x280 [ 1452.213222] ? find_held_lock+0x36/0x1c0 [ 1452.217412] ? punch_hole+0x2908/0x43c0 [ 1452.221404] ? expand_files.part.8+0x571/0x9a0 [ 1452.225993] ? perf_trace_sched_process_exec+0x860/0x860 [ 1452.231469] ? find_held_lock+0x36/0x1c0 [ 1452.235538] __should_failslab+0x124/0x180 [ 1452.239787] should_failslab+0x9/0x14 [ 1452.243591] kmem_cache_alloc+0x2be/0x730 [ 1452.247756] ? shmem_destroy_callback+0xc0/0xc0 [ 1452.252453] shmem_alloc_inode+0x1b/0x40 [ 1452.256542] alloc_inode+0x63/0x190 [ 1452.260171] new_inode_pseudo+0x71/0x1a0 [ 1452.264246] ? prune_icache_sb+0x1c0/0x1c0 [ 1452.268500] ? _raw_spin_unlock+0x2c/0x50 [ 1452.272720] new_inode+0x1c/0x40 [ 1452.276103] shmem_get_inode+0xf1/0x920 [ 1452.280096] ? shmem_encode_fh+0x340/0x340 [ 1452.284333] ? lock_downgrade+0x900/0x900 [ 1452.288526] ? lock_release+0xa10/0xa10 [ 1452.292506] ? perf_trace_sched_process_exec+0x860/0x860 [ 1452.297964] ? usercopy_warn+0x110/0x110 [ 1452.302061] __shmem_file_setup.part.50+0x83/0x2a0 [ 1452.307003] shmem_file_setup+0x65/0x90 [ 1452.310984] __x64_sys_memfd_create+0x2af/0x4f0 [ 1452.315698] ? memfd_fcntl+0x1910/0x1910 [ 1452.319775] do_syscall_64+0x1b9/0x820 [ 1452.323683] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1452.329057] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1452.333995] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1452.338858] ? trace_hardirqs_on_caller+0x310/0x310 [ 1452.343900] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1452.348950] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1452.353991] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1452.358848] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1452.364069] RIP: 0033:0x457569 22:59:17 executing program 0 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) [ 1452.367268] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1452.386190] RSP: 002b:00007f2a4600ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1452.393955] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000457569 [ 1452.401242] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc787 [ 1452.408511] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1452.415781] R10: 0000000020000200 R11: 0000000000000246 R12: 00007f2a4600f6d4 [ 1452.423053] R13: 00000000004c5122 R14: 00000000004d8ef0 R15: 0000000000000003 [ 1452.579557] FAULT_INJECTION: forcing a failure. [ 1452.579557] name failslab, interval 1, probability 0, space 0, times 0 [ 1452.594118] CPU: 1 PID: 21604 Comm: syz-executor0 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 1452.602786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1452.612188] Call Trace: [ 1452.614828] dump_stack+0x244/0x39d [ 1452.618506] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1452.623743] ? debug_smp_processor_id+0x1c/0x20 [ 1452.628439] ? perf_trace_lock+0x14d/0x7a0 [ 1452.632804] should_fail.cold.4+0xa/0x17 [ 1452.636898] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1452.642047] ? check_preemption_disabled+0x48/0x280 [ 1452.647111] ? perf_trace_lock+0x14d/0x7a0 [ 1452.651383] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1452.656935] ? check_preemption_disabled+0x48/0x280 [ 1452.661978] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1452.667554] ? lock_is_held_type+0x210/0x210 [ 1452.672006] ? debug_smp_processor_id+0x1c/0x20 22:59:17 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) [ 1452.676746] ? perf_trace_lock+0x14d/0x7a0 [ 1452.681024] ? find_held_lock+0x36/0x1c0 [ 1452.685132] ? perf_trace_sched_process_exec+0x860/0x860 [ 1452.690681] __should_failslab+0x124/0x180 [ 1452.694976] should_failslab+0x9/0x14 [ 1452.698808] kmem_cache_alloc+0x2be/0x730 [ 1452.702983] ? mpol_shared_policy_init+0x235/0x650 [ 1452.707948] ? current_time+0x72/0x1b0 [ 1452.711881] __d_alloc+0xc8/0xb90 [ 1452.715390] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 1452.720438] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1452.725487] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 1452.730738] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1452.736302] ? timespec64_trunc+0xea/0x180 [ 1452.740557] ? inode_init_owner+0x340/0x340 [ 1452.744909] ? _raw_spin_unlock+0x2c/0x50 [ 1452.749091] ? current_time+0x10b/0x1b0 [ 1452.753088] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1452.758653] ? __lockdep_init_map+0x105/0x590 [ 1452.763197] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1452.768765] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1452.774336] d_alloc_pseudo+0x1d/0x30 22:59:17 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) [ 1452.778161] alloc_file_pseudo+0x158/0x3f0 [ 1452.782431] ? alloc_file+0x4d0/0x4d0 [ 1452.786277] ? usercopy_warn+0x110/0x110 [ 1452.790372] __shmem_file_setup.part.50+0x110/0x2a0 [ 1452.795434] shmem_file_setup+0x65/0x90 [ 1452.799436] __x64_sys_memfd_create+0x2af/0x4f0 [ 1452.804151] ? memfd_fcntl+0x1910/0x1910 [ 1452.808257] do_syscall_64+0x1b9/0x820 [ 1452.812218] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1452.817611] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1452.817629] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1452.817649] ? trace_hardirqs_on_caller+0x310/0x310 [ 1452.817666] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1452.817697] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1452.817719] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1452.827582] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1452.827597] RIP: 0033:0x457569 [ 1452.827616] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:59:17 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) [ 1452.827625] RSP: 002b:00007f2a4600ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1452.827639] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000457569 [ 1452.827648] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc787 [ 1452.827658] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1452.827684] R10: 0000000020000200 R11: 0000000000000246 R12: 00007f2a4600f6d4 [ 1452.911699] R13: 00000000004c5122 R14: 00000000004d8ef0 R15: 0000000000000003 22:59:17 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000000c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@cachetag={'cachetag', 0x3d, '9p\x00'}}]}}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:17 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000ffffffffffffff7f004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:17 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0x4020940d, &(0x7f0000000200)={{}, 'port1\x00'}) 22:59:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000a00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:17 executing program 0 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:17 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) [ 1453.139752] FAULT_INJECTION: forcing a failure. [ 1453.139752] name failslab, interval 1, probability 0, space 0, times 0 22:59:17 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0045878, &(0x7f0000000200)={{}, 'port1\x00'}) [ 1453.196449] CPU: 1 PID: 21636 Comm: syz-executor0 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 1453.205097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1453.214483] Call Trace: [ 1453.217113] dump_stack+0x244/0x39d [ 1453.220799] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1453.226058] ? debug_smp_processor_id+0x1c/0x20 [ 1453.230759] ? perf_trace_lock+0x14d/0x7a0 [ 1453.235042] should_fail.cold.4+0xa/0x17 [ 1453.239128] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1453.244265] ? save_stack+0x43/0xd0 [ 1453.247907] ? kasan_kmalloc+0xc7/0xe0 [ 1453.251812] ? lock_is_held_type+0x210/0x210 [ 1453.256252] ? graph_lock+0x270/0x270 [ 1453.260099] ? find_held_lock+0x36/0x1c0 [ 1453.264219] ? perf_trace_sched_process_exec+0x860/0x860 [ 1453.269728] ? lock_downgrade+0x900/0x900 [ 1453.273910] __should_failslab+0x124/0x180 [ 1453.278191] should_failslab+0x9/0x14 [ 1453.282025] kmem_cache_alloc+0x2be/0x730 [ 1453.286203] ? d_set_d_op+0x31d/0x410 [ 1453.290036] __alloc_file+0xa8/0x470 [ 1453.293775] ? file_free_rcu+0xd0/0xd0 [ 1453.297684] ? d_instantiate+0x79/0xa0 [ 1453.301594] ? lock_downgrade+0x900/0x900 [ 1453.305782] ? kasan_check_read+0x11/0x20 [ 1453.309951] ? do_raw_spin_unlock+0xa7/0x330 [ 1453.314403] ? do_raw_spin_trylock+0x270/0x270 [ 1453.319032] alloc_empty_file+0x72/0x170 [ 1453.323155] alloc_file+0x5e/0x4d0 [ 1453.326713] ? _raw_spin_unlock+0x2c/0x50 [ 1453.330891] alloc_file_pseudo+0x261/0x3f0 [ 1453.335174] ? alloc_file+0x4d0/0x4d0 [ 1453.339037] ? usercopy_warn+0x110/0x110 [ 1453.343133] __shmem_file_setup.part.50+0x110/0x2a0 [ 1453.348178] shmem_file_setup+0x65/0x90 [ 1453.352192] __x64_sys_memfd_create+0x2af/0x4f0 [ 1453.356876] ? memfd_fcntl+0x1910/0x1910 [ 1453.360988] do_syscall_64+0x1b9/0x820 [ 1453.364891] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1453.370277] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1453.375243] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1453.380113] ? trace_hardirqs_on_caller+0x310/0x310 [ 1453.385150] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1453.390214] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1453.395278] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1453.400154] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1453.405401] RIP: 0033:0x457569 [ 1453.408607] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1453.427537] RSP: 002b:00007f2a4600ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1453.435277] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000457569 22:59:18 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) [ 1453.442567] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc787 [ 1453.449863] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1453.457197] R10: 0000000020000200 R11: 0000000000000246 R12: 00007f2a4600f6d4 [ 1453.464486] R13: 00000000004c5122 R14: 00000000004d8ef0 R15: 0000000000000003 22:59:18 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0189436, &(0x7f0000000200)={{}, 'port1\x00'}) 22:59:18 executing program 0 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000004004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:18 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) [ 1453.680618] FAULT_INJECTION: forcing a failure. [ 1453.680618] name failslab, interval 1, probability 0, space 0, times 0 [ 1453.701186] CPU: 0 PID: 21660 Comm: syz-executor0 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 1453.709842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1453.719257] Call Trace: [ 1453.721877] dump_stack+0x244/0x39d [ 1453.725538] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1453.730761] ? debug_smp_processor_id+0x1c/0x20 [ 1453.735466] ? perf_trace_lock+0x14d/0x7a0 [ 1453.739734] should_fail.cold.4+0xa/0x17 [ 1453.743850] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1453.749012] ? is_bpf_text_address+0xd3/0x170 [ 1453.753544] ? kernel_text_address+0x79/0xf0 [ 1453.757975] ? __kernel_text_address+0xd/0x40 [ 1453.762491] ? unwind_get_return_address+0x61/0xa0 [ 1453.767441] ? __save_stack_trace+0x8d/0xf0 [ 1453.771795] ? find_held_lock+0x36/0x1c0 [ 1453.775896] ? __x64_sys_memfd_create+0x2af/0x4f0 [ 1453.780768] ? perf_trace_sched_process_exec+0x860/0x860 [ 1453.786255] __should_failslab+0x124/0x180 [ 1453.790560] should_failslab+0x9/0x14 [ 1453.794383] kmem_cache_alloc_trace+0x2d7/0x750 [ 1453.799071] ? __might_sleep+0x95/0x190 [ 1453.803122] apparmor_file_alloc_security+0x17b/0xac0 [ 1453.808338] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1453.813903] ? apparmor_path_rename+0xcd0/0xcd0 [ 1453.818601] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1453.823642] ? kmem_cache_alloc+0x33a/0x730 [ 1453.828002] ? d_set_d_op+0x31d/0x410 [ 1453.831852] security_file_alloc+0x4c/0xa0 [ 1453.836113] __alloc_file+0x12a/0x470 [ 1453.839936] ? file_free_rcu+0xd0/0xd0 [ 1453.843856] ? d_instantiate+0x79/0xa0 [ 1453.847769] ? lock_downgrade+0x900/0x900 [ 1453.851957] ? kasan_check_read+0x11/0x20 [ 1453.856118] ? do_raw_spin_unlock+0xa7/0x330 [ 1453.856135] ? do_raw_spin_trylock+0x270/0x270 [ 1453.856161] alloc_empty_file+0x72/0x170 [ 1453.856181] alloc_file+0x5e/0x4d0 [ 1453.856197] ? _raw_spin_unlock+0x2c/0x50 [ 1453.856225] alloc_file_pseudo+0x261/0x3f0 [ 1453.856246] ? alloc_file+0x4d0/0x4d0 [ 1453.856266] ? usercopy_warn+0x110/0x110 [ 1453.865311] __shmem_file_setup.part.50+0x110/0x2a0 [ 1453.865338] shmem_file_setup+0x65/0x90 [ 1453.865358] __x64_sys_memfd_create+0x2af/0x4f0 [ 1453.865379] ? memfd_fcntl+0x1910/0x1910 [ 1453.906967] do_syscall_64+0x1b9/0x820 [ 1453.910877] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1453.916273] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1453.921224] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1453.926105] ? trace_hardirqs_on_caller+0x310/0x310 [ 1453.931150] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1453.936189] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1453.936215] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1453.936242] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1453.936256] RIP: 0033:0x457569 [ 1453.936273] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1453.936283] RSP: 002b:00007f2a4600ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1453.936298] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000457569 [ 1453.936308] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc787 [ 1453.936318] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 1453.936334] R10: 0000000020000200 R11: 0000000000000246 R12: 00007f2a4600f6d4 [ 1453.946242] R13: 00000000004c5122 R14: 00000000004d8ef0 R15: 0000000000000003 22:59:18 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = syz_open_dev$media(&(0x7f0000000480)='/dev/media#\x00', 0x9, 0x800) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f00000004c0)={{0x2, 0x4e22, @rand_addr=0x401}, {0x1, @local}, 0x4, {0x2, 0x4e21, @broadcast}, 'rose0\x00'}) r3 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$KVM_INTERRUPT(r3, 0x4004ae86, &(0x7f0000000240)=0xfffffffffffff1ba) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000440), 0x10) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_DIRTY_TLB(r5, 0x4010aeaa, &(0x7f0000000400)={0x1f, 0x3}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f0000000280)={0x0, 0x5}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000380)={r6, 0x101, 0xb222}, &(0x7f00000003c0)=0x8) 22:59:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000023000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:18 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:59:18 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0x80045301, &(0x7f0000000200)={{}, 'port1\x00'}) 22:59:18 executing program 0 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000500000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) [ 1454.215861] FAULT_INJECTION: forcing a failure. [ 1454.215861] name failslab, interval 1, probability 0, space 0, times 0 [ 1454.285895] CPU: 0 PID: 21683 Comm: syz-executor0 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 1454.294542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1454.303941] Call Trace: [ 1454.306560] dump_stack+0x244/0x39d [ 1454.310227] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1454.315454] ? debug_smp_processor_id+0x1c/0x20 [ 1454.320152] ? perf_trace_lock+0x14d/0x7a0 [ 1454.324417] should_fail.cold.4+0xa/0x17 [ 1454.328497] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1454.333626] ? lock_downgrade+0x900/0x900 [ 1454.337790] ? current_time+0x72/0x1b0 [ 1454.341705] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1454.347259] ? check_preemption_disabled+0x48/0x280 [ 1454.352296] ? debug_smp_processor_id+0x1c/0x20 [ 1454.356985] ? perf_trace_lock+0x14d/0x7a0 [ 1454.361242] ? find_held_lock+0x36/0x1c0 [ 1454.365349] ? perf_trace_sched_process_exec+0x860/0x860 [ 1454.370823] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1454.376388] __should_failslab+0x124/0x180 [ 1454.380639] should_failslab+0x9/0x14 [ 1454.384460] kmem_cache_alloc+0x2be/0x730 [ 1454.388623] ? do_sys_ftruncate+0x428/0x550 [ 1454.392966] ? lock_downgrade+0x900/0x900 [ 1454.397164] getname_flags+0xd0/0x590 [ 1454.400980] getname+0x19/0x20 [ 1454.404204] do_sys_open+0x383/0x700 [ 1454.407957] ? filp_open+0x80/0x80 [ 1454.411507] ? trace_hardirqs_off_caller+0x300/0x300 [ 1454.416623] ? do_sys_ftruncate+0x449/0x550 [ 1454.420978] __x64_sys_open+0x7e/0xc0 [ 1454.424798] do_syscall_64+0x1b9/0x820 [ 1454.428729] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1454.434114] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1454.439064] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1454.443952] ? trace_hardirqs_on_caller+0x310/0x310 [ 1454.448992] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1454.454050] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1454.459084] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1454.463959] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1454.469181] RIP: 0033:0x4111a1 22:59:19 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:59:19 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0x40049409, &(0x7f0000000200)={{}, 'port1\x00'}) [ 1454.472395] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1454.491319] RSP: 002b:00007f2a4600ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1454.499061] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004111a1 [ 1454.506361] RDX: 00007f2a4600eafa RSI: 0000000000000002 RDI: 00007f2a4600eaf0 [ 1454.513642] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1454.520940] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1454.528227] R13: 0000000000000000 R14: 00000000004d8ef0 R15: 0000000000000003 22:59:19 executing program 0 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:19 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0x5450, &(0x7f0000000200)={{}, 'port1\x00'}) 22:59:19 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) [ 1454.711842] FAULT_INJECTION: forcing a failure. [ 1454.711842] name failslab, interval 1, probability 0, space 0, times 0 [ 1454.740529] CPU: 0 PID: 21708 Comm: syz-executor0 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 1454.749266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1454.758627] Call Trace: [ 1454.761231] dump_stack+0x244/0x39d [ 1454.764897] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1454.770104] ? debug_smp_processor_id+0x1c/0x20 [ 1454.774789] ? perf_trace_lock+0x14d/0x7a0 [ 1454.779049] should_fail.cold.4+0xa/0x17 [ 1454.783124] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1454.788289] ? lock_downgrade+0x900/0x900 [ 1454.792463] ? current_time+0x72/0x1b0 [ 1454.796350] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1454.801921] ? check_preemption_disabled+0x48/0x280 [ 1454.806977] ? debug_smp_processor_id+0x1c/0x20 [ 1454.811656] ? perf_trace_lock+0x14d/0x7a0 [ 1454.815950] ? find_held_lock+0x36/0x1c0 [ 1454.820043] ? perf_trace_sched_process_exec+0x860/0x860 [ 1454.825512] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1454.831067] __should_failslab+0x124/0x180 [ 1454.835333] should_failslab+0x9/0x14 [ 1454.839162] kmem_cache_alloc+0x2be/0x730 [ 1454.843330] ? do_sys_ftruncate+0x428/0x550 [ 1454.847690] ? lock_downgrade+0x900/0x900 [ 1454.851863] getname_flags+0xd0/0x590 [ 1454.855715] getname+0x19/0x20 [ 1454.858946] do_sys_open+0x383/0x700 [ 1454.862691] ? filp_open+0x80/0x80 [ 1454.866258] ? trace_hardirqs_off_caller+0x300/0x300 [ 1454.871393] ? do_sys_ftruncate+0x449/0x550 [ 1454.875778] __x64_sys_open+0x7e/0xc0 [ 1454.879623] do_syscall_64+0x1b9/0x820 [ 1454.883563] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1454.888959] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1454.893934] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1454.898797] ? trace_hardirqs_on_caller+0x310/0x310 [ 1454.903849] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1454.908921] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1454.913983] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1454.918877] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1454.924086] RIP: 0033:0x4111a1 [ 1454.927295] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1454.946243] RSP: 002b:00007f2a4600ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1454.953996] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004111a1 22:59:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00007fffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) [ 1454.961373] RDX: 00007f2a4600eafa RSI: 0000000000000002 RDI: 00007f2a4600eaf0 [ 1454.968661] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1454.975972] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1454.983262] R13: 0000000000000000 R14: 00000000004d8ef0 R15: 0000000000000003 22:59:20 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000240)={0x2, &(0x7f0000000040)=[{0x0}, {}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r1, 0x40086424, &(0x7f0000000280)={r2, 0x3}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r3, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r3, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:20 executing program 0 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000e0ffffffffffffff004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:20 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0x5421, &(0x7f0000000200)={{}, 'port1\x00'}) 22:59:20 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:59:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000005000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) [ 1455.470948] FAULT_INJECTION: forcing a failure. [ 1455.470948] name failslab, interval 1, probability 0, space 0, times 0 [ 1455.519306] CPU: 0 PID: 21745 Comm: syz-executor0 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 1455.527980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1455.537367] Call Trace: [ 1455.540020] dump_stack+0x244/0x39d [ 1455.543737] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1455.548985] ? debug_smp_processor_id+0x1c/0x20 [ 1455.553741] ? perf_trace_lock+0x14d/0x7a0 [ 1455.558042] should_fail.cold.4+0xa/0x17 [ 1455.562126] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1455.567267] ? lock_downgrade+0x900/0x900 [ 1455.571410] ? check_preemption_disabled+0x48/0x280 [ 1455.576424] ? kasan_check_read+0x11/0x20 [ 1455.580569] ? find_held_lock+0x36/0x1c0 [ 1455.584639] ? debug_smp_processor_id+0x1c/0x20 [ 1455.589363] ? perf_trace_sched_process_exec+0x860/0x860 [ 1455.594838] __should_failslab+0x124/0x180 [ 1455.599103] should_failslab+0x9/0x14 [ 1455.602960] kmem_cache_alloc+0x2be/0x730 [ 1455.607135] ? graph_lock+0x270/0x270 [ 1455.610973] ? print_usage_bug+0xc0/0xc0 [ 1455.615064] ? mark_held_locks+0x130/0x130 [ 1455.619325] __alloc_file+0xa8/0x470 [ 1455.623077] ? file_free_rcu+0xd0/0xd0 [ 1455.626983] ? find_held_lock+0x36/0x1c0 [ 1455.631079] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1455.636631] ? check_preemption_disabled+0x48/0x280 [ 1455.641708] alloc_empty_file+0x72/0x170 [ 1455.645820] path_openat+0x170/0x5150 [ 1455.649666] ? lock_is_held_type+0x210/0x210 [ 1455.654107] ? unwind_dump+0x190/0x190 [ 1455.658022] ? graph_lock+0x270/0x270 [ 1455.661905] ? path_lookupat.isra.43+0xc00/0xc00 [ 1455.666728] ? unwind_get_return_address+0x61/0xa0 [ 1455.671693] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1455.676769] ? expand_files.part.8+0x571/0x9a0 [ 1455.681409] ? find_held_lock+0x36/0x1c0 [ 1455.685529] ? __alloc_fd+0x347/0x6e0 [ 1455.689344] ? lock_downgrade+0x900/0x900 [ 1455.693500] ? getname+0x19/0x20 [ 1455.696886] ? kasan_check_read+0x11/0x20 [ 1455.701061] ? do_raw_spin_unlock+0xa7/0x330 [ 1455.705525] ? do_raw_spin_trylock+0x270/0x270 [ 1455.710118] ? __lock_is_held+0xb5/0x140 [ 1455.714198] ? __check_object_size+0xb1/0x782 [ 1455.718730] ? _raw_spin_unlock+0x2c/0x50 [ 1455.722889] ? __alloc_fd+0x347/0x6e0 [ 1455.726744] do_filp_open+0x255/0x380 [ 1455.730598] ? may_open_dev+0x100/0x100 [ 1455.734592] ? get_unused_fd_flags+0x122/0x1a0 [ 1455.739165] ? __alloc_fd+0x6e0/0x6e0 [ 1455.742988] do_sys_open+0x568/0x700 [ 1455.746752] ? filp_open+0x80/0x80 [ 1455.750324] ? trace_hardirqs_off_caller+0x300/0x300 [ 1455.755454] ? do_sys_ftruncate+0x449/0x550 [ 1455.759806] __x64_sys_open+0x7e/0xc0 [ 1455.763624] do_syscall_64+0x1b9/0x820 [ 1455.767527] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1455.772908] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1455.777966] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1455.782859] ? trace_hardirqs_on_caller+0x310/0x310 [ 1455.787908] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1455.792961] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1455.797999] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1455.802888] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1455.808094] RIP: 0033:0x4111a1 [ 1455.811295] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1455.830201] RSP: 002b:00007f2a4600ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1455.837932] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004111a1 [ 1455.845207] RDX: 00007f2a4600eafa RSI: 0000000000000002 RDI: 00007f2a4600eaf0 [ 1455.852479] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1455.859770] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 22:59:20 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:59:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000000000003f004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:20 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0x5452, &(0x7f0000000200)={{}, 'port1\x00'}) [ 1455.867076] R13: 0000000000000000 R14: 00000000004d8ef0 R15: 0000000000000003 22:59:20 executing program 0 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:20 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:59:20 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0x4058534c, &(0x7f0000000200)={{}, 'port1\x00'}) [ 1456.186592] FAULT_INJECTION: forcing a failure. [ 1456.186592] name failslab, interval 1, probability 0, space 0, times 0 [ 1456.202111] CPU: 0 PID: 21773 Comm: syz-executor0 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 1456.210767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1456.220248] Call Trace: [ 1456.222886] dump_stack+0x244/0x39d [ 1456.226591] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1456.231819] ? debug_smp_processor_id+0x1c/0x20 [ 1456.236509] ? perf_trace_lock+0x14d/0x7a0 [ 1456.240758] should_fail.cold.4+0xa/0x17 [ 1456.244870] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1456.249989] ? is_bpf_text_address+0xd3/0x170 [ 1456.254536] ? kernel_text_address+0x79/0xf0 [ 1456.258962] ? __kernel_text_address+0xd/0x40 [ 1456.263475] ? unwind_get_return_address+0x61/0xa0 [ 1456.268457] ? __save_stack_trace+0x8d/0xf0 [ 1456.272807] ? find_held_lock+0x36/0x1c0 [ 1456.276928] ? do_syscall_64+0x1b9/0x820 [ 1456.281022] ? perf_trace_sched_process_exec+0x860/0x860 [ 1456.286488] __should_failslab+0x124/0x180 [ 1456.290760] should_failslab+0x9/0x14 [ 1456.294586] kmem_cache_alloc_trace+0x2d7/0x750 [ 1456.299271] ? __might_sleep+0x95/0x190 [ 1456.303268] apparmor_file_alloc_security+0x17b/0xac0 [ 1456.308478] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1456.314037] ? apparmor_path_rename+0xcd0/0xcd0 [ 1456.318750] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1456.323777] ? kmem_cache_alloc+0x33a/0x730 [ 1456.328106] ? graph_lock+0x270/0x270 [ 1456.331928] security_file_alloc+0x4c/0xa0 [ 1456.336197] __alloc_file+0x12a/0x470 [ 1456.340031] ? file_free_rcu+0xd0/0xd0 [ 1456.343969] ? find_held_lock+0x36/0x1c0 [ 1456.348072] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1456.353648] ? check_preemption_disabled+0x48/0x280 [ 1456.358722] alloc_empty_file+0x72/0x170 [ 1456.362808] path_openat+0x170/0x5150 [ 1456.366638] ? lock_is_held_type+0x210/0x210 [ 1456.371093] ? unwind_dump+0x190/0x190 [ 1456.375019] ? graph_lock+0x270/0x270 [ 1456.378876] ? path_lookupat.isra.43+0xc00/0xc00 [ 1456.383702] ? unwind_get_return_address+0x61/0xa0 [ 1456.388653] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1456.393743] ? expand_files.part.8+0x571/0x9a0 [ 1456.398343] ? find_held_lock+0x36/0x1c0 [ 1456.402427] ? __alloc_fd+0x347/0x6e0 [ 1456.406277] ? lock_downgrade+0x900/0x900 [ 1456.410436] ? getname+0x19/0x20 [ 1456.413833] ? kasan_check_read+0x11/0x20 [ 1456.417998] ? do_raw_spin_unlock+0xa7/0x330 [ 1456.422441] ? do_raw_spin_trylock+0x270/0x270 [ 1456.427065] ? __lock_is_held+0xb5/0x140 [ 1456.431170] ? __check_object_size+0xb1/0x782 [ 1456.435750] ? _raw_spin_unlock+0x2c/0x50 [ 1456.439934] ? __alloc_fd+0x347/0x6e0 [ 1456.443798] do_filp_open+0x255/0x380 [ 1456.447627] ? may_open_dev+0x100/0x100 [ 1456.451637] ? get_unused_fd_flags+0x122/0x1a0 [ 1456.456310] ? __alloc_fd+0x6e0/0x6e0 [ 1456.460148] do_sys_open+0x568/0x700 [ 1456.463881] ? filp_open+0x80/0x80 [ 1456.467434] ? trace_hardirqs_off_caller+0x300/0x300 [ 1456.472557] ? do_sys_ftruncate+0x449/0x550 [ 1456.476916] __x64_sys_open+0x7e/0xc0 [ 1456.480740] do_syscall_64+0x1b9/0x820 [ 1456.484702] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1456.490139] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1456.495079] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1456.499950] ? trace_hardirqs_on_caller+0x310/0x310 [ 1456.504980] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1456.510034] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1456.515072] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1456.519953] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1456.525179] RIP: 0033:0x4111a1 [ 1456.528399] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1456.547299] RSP: 002b:00007f2a4600ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1456.555027] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004111a1 [ 1456.562319] RDX: 00007f2a4600eafa RSI: 0000000000000002 RDI: 00007f2a4600eaf0 [ 1456.569594] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1456.576883] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1456.584175] R13: 0000000000000000 R14: 00000000004d8ef0 R15: 0000000000000003 22:59:21 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountstats\x00') ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'veth1_to_team\x00', 0x1}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r2, 0x0) pipe(&(0x7f0000000180)) ioctl$PPPIOCGMRU(r1, 0x80047453, &(0x7f0000000280)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000fffffff400000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:21 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0x5451, &(0x7f0000000200)={{}, 'port1\x00'}) 22:59:21 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:59:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00006000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:21 executing program 0 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) [ 1456.789965] FAULT_INJECTION: forcing a failure. [ 1456.789965] name failslab, interval 1, probability 0, space 0, times 0 [ 1456.810887] CPU: 0 PID: 21791 Comm: syz-executor0 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 1456.819557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1456.828943] Call Trace: [ 1456.831623] dump_stack+0x244/0x39d 22:59:21 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:59:21 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0x404c534a, &(0x7f0000000200)={{}, 'port1\x00'}) [ 1456.835322] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1456.840562] ? debug_smp_processor_id+0x1c/0x20 [ 1456.845277] ? perf_trace_lock+0x14d/0x7a0 [ 1456.849582] should_fail.cold.4+0xa/0x17 [ 1456.853720] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1456.858896] ? debug_smp_processor_id+0x1c/0x20 [ 1456.863596] ? perf_trace_lock+0x14d/0x7a0 [ 1456.867878] ? check_preemption_disabled+0x48/0x280 [ 1456.872944] ? graph_lock+0x270/0x270 [ 1456.876773] ? lock_acquire+0x1ed/0x520 [ 1456.880879] ? lo_ioctl+0x25d/0x22a0 [ 1456.884616] ? find_held_lock+0x36/0x1c0 [ 1456.888725] ? __lock_is_held+0xb5/0x140 [ 1456.892831] ? perf_trace_sched_process_exec+0x860/0x860 [ 1456.898331] __should_failslab+0x124/0x180 [ 1456.902599] should_failslab+0x9/0x14 [ 1456.906419] kmem_cache_alloc_trace+0x2d7/0x750 [ 1456.911099] ? check_preemption_disabled+0x48/0x280 [ 1456.916148] __kthread_create_on_node+0x137/0x540 [ 1456.921028] ? loop_get_status64+0x120/0x120 [ 1456.925493] ? kthread_parkme+0xb0/0xb0 [ 1456.929519] ? __lockdep_init_map+0x105/0x590 [ 1456.934096] ? __lockdep_init_map+0x105/0x590 [ 1456.938644] ? loop_get_status64+0x120/0x120 [ 1456.943123] kthread_create_on_node+0xb1/0xe0 [ 1456.947647] ? __kthread_create_on_node+0x540/0x540 [ 1456.952713] ? check_preemption_disabled+0x48/0x280 [ 1456.957750] lo_ioctl+0xcb3/0x22a0 [ 1456.961308] ? lo_rw_aio+0x1ef0/0x1ef0 [ 1456.965260] ? find_held_lock+0x36/0x1c0 [ 1456.969394] ? lo_rw_aio+0x1ef0/0x1ef0 [ 1456.973401] blkdev_ioctl+0x98e/0x21b0 [ 1456.977323] ? blkpg_ioctl+0xc10/0xc10 [ 1456.981228] ? lock_downgrade+0x900/0x900 [ 1456.985401] ? check_preemption_disabled+0x48/0x280 [ 1456.990445] ? kasan_check_read+0x11/0x20 [ 1456.994614] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1456.999939] ? rcu_read_unlock_special+0x370/0x370 [ 1457.004884] ? __fget+0x4d1/0x740 [ 1457.008371] ? ksys_dup3+0x680/0x680 [ 1457.012144] block_ioctl+0xee/0x130 [ 1457.015830] ? blkdev_fallocate+0x400/0x400 [ 1457.020191] do_vfs_ioctl+0x1de/0x1790 [ 1457.024100] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1457.029645] ? ioctl_preallocate+0x300/0x300 [ 1457.034071] ? __fget_light+0x2e9/0x430 [ 1457.038083] ? fget_raw+0x20/0x20 [ 1457.041559] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1457.046583] ? kmem_cache_free+0x24f/0x290 [ 1457.050865] ? putname+0xf7/0x130 [ 1457.054342] ? do_syscall_64+0x9a/0x820 [ 1457.058329] ? do_syscall_64+0x9a/0x820 [ 1457.062343] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1457.067048] ? security_file_ioctl+0x94/0xc0 [ 1457.071498] ksys_ioctl+0xa9/0xd0 [ 1457.074987] __x64_sys_ioctl+0x73/0xb0 [ 1457.078969] do_syscall_64+0x1b9/0x820 [ 1457.082873] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1457.088257] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1457.093196] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1457.098067] ? trace_hardirqs_on_caller+0x310/0x310 [ 1457.103099] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1457.108132] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1457.113177] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1457.118092] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1457.123310] RIP: 0033:0x4573d7 [ 1457.126530] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1457.145437] RSP: 002b:00007f2a4600ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1457.153651] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004573d7 [ 1457.160945] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1457.168220] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1457.175548] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1457.182844] R13: 0000000000000000 R14: 00000000004d8ef0 R15: 0000000000000003 22:59:22 executing program 0 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:22 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:59:22 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0x80045300, &(0x7f0000000200)={{}, 'port1\x00'}) 22:59:22 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) [ 1457.417746] FAULT_INJECTION: forcing a failure. [ 1457.417746] name failslab, interval 1, probability 0, space 0, times 0 [ 1457.431939] CPU: 1 PID: 21813 Comm: syz-executor0 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 1457.440597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1457.449977] Call Trace: [ 1457.452627] dump_stack+0x244/0x39d [ 1457.456310] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1457.461526] ? debug_smp_processor_id+0x1c/0x20 [ 1457.466221] ? perf_trace_lock+0x14d/0x7a0 [ 1457.470516] should_fail.cold.4+0xa/0x17 [ 1457.474617] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1457.479767] ? graph_lock+0x270/0x270 [ 1457.483615] ? print_usage_bug+0xc0/0xc0 [ 1457.487736] ? find_held_lock+0x36/0x1c0 [ 1457.491838] ? __lock_is_held+0xb5/0x140 [ 1457.496050] ? hash_net6_head+0x5a8/0xb50 [ 1457.500284] ? reweight_entity+0x10f0/0x10f0 [ 1457.504745] ? perf_trace_sched_process_exec+0x860/0x860 [ 1457.510268] __should_failslab+0x124/0x180 [ 1457.514532] should_failslab+0x9/0x14 [ 1457.518354] kmem_cache_alloc+0x2be/0x730 [ 1457.522531] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1457.527657] __kernfs_new_node+0x127/0x8d0 [ 1457.531924] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1457.536736] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1457.542322] ? lock_is_held_type+0x210/0x210 [ 1457.546774] ? debug_smp_processor_id+0x1c/0x20 [ 1457.551462] ? perf_trace_lock+0x14d/0x7a0 [ 1457.555716] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1457.560842] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1457.565984] ? graph_lock+0x270/0x270 [ 1457.569807] ? lock_is_held_type+0x210/0x210 [ 1457.574232] ? print_usage_bug+0xc0/0xc0 [ 1457.578346] ? graph_lock+0x270/0x270 [ 1457.582196] ? enqueue_task_fair+0x24d/0xa50 [ 1457.586629] ? find_held_lock+0x36/0x1c0 [ 1457.590754] kernfs_new_node+0x95/0x120 [ 1457.594749] kernfs_create_dir_ns+0x4d/0x160 [ 1457.599201] internal_create_group+0x5fc/0xd80 [ 1457.603827] ? remove_files.isra.1+0x190/0x190 [ 1457.608444] ? up_write+0x7b/0x220 [ 1457.612014] ? down_write_nested+0x130/0x130 [ 1457.616432] ? down_read+0x120/0x120 [ 1457.620217] sysfs_create_group+0x1f/0x30 [ 1457.624377] lo_ioctl+0x166a/0x22a0 [ 1457.628014] ? lo_rw_aio+0x1ef0/0x1ef0 [ 1457.631901] ? find_held_lock+0x36/0x1c0 [ 1457.635967] ? lo_rw_aio+0x1ef0/0x1ef0 [ 1457.639855] blkdev_ioctl+0x98e/0x21b0 [ 1457.643760] ? blkpg_ioctl+0xc10/0xc10 [ 1457.647645] ? lock_downgrade+0x900/0x900 [ 1457.651796] ? check_preemption_disabled+0x48/0x280 [ 1457.656846] ? kasan_check_read+0x11/0x20 [ 1457.661011] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1457.666291] ? rcu_read_unlock_special+0x370/0x370 [ 1457.671261] ? __fget+0x4d1/0x740 [ 1457.674743] ? ksys_dup3+0x680/0x680 [ 1457.678483] block_ioctl+0xee/0x130 [ 1457.682130] ? blkdev_fallocate+0x400/0x400 [ 1457.686473] do_vfs_ioctl+0x1de/0x1790 [ 1457.690395] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1457.695984] ? ioctl_preallocate+0x300/0x300 [ 1457.700482] ? __fget_light+0x2e9/0x430 [ 1457.704505] ? fget_raw+0x20/0x20 [ 1457.708011] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1457.713051] ? kmem_cache_free+0x24f/0x290 [ 1457.717305] ? putname+0xf7/0x130 [ 1457.720803] ? do_syscall_64+0x9a/0x820 [ 1457.724799] ? do_syscall_64+0x9a/0x820 [ 1457.728802] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1457.733398] ? security_file_ioctl+0x94/0xc0 [ 1457.737834] ksys_ioctl+0xa9/0xd0 [ 1457.741321] __x64_sys_ioctl+0x73/0xb0 [ 1457.745225] do_syscall_64+0x1b9/0x820 [ 1457.749113] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1457.754508] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1457.759442] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1457.764305] ? trace_hardirqs_on_caller+0x310/0x310 [ 1457.769375] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1457.774403] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1457.779439] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1457.784301] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1457.789549] RIP: 0033:0x4573d7 [ 1457.792749] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1457.811652] RSP: 002b:00007f2a4600ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1457.819395] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004573d7 [ 1457.826669] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1457.833978] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1457.841269] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1457.848552] R13: 0000000000000000 R14: 00000000004d8ef0 R15: 0000000000000003 22:59:23 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) recvfrom(r1, &(0x7f00000003c0)=""/35, 0x23, 0x0, &(0x7f0000000400)=@nl=@unspec, 0x80) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x103000, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000380)) connect$vsock_dgram(r2, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r4 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x23, 0x8800) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000000280)={@ipv4={[], [], @broadcast}, r5}, 0x14) shutdown(r2, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:23 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0x2, &(0x7f0000000200)={{}, 'port1\x00'}) 22:59:23 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000100000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00007a00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:23 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:59:23 executing program 0 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:23 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:59:23 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0x5460, &(0x7f0000000200)={{}, 'port1\x00'}) [ 1458.377923] FAULT_INJECTION: forcing a failure. [ 1458.377923] name failslab, interval 1, probability 0, space 0, times 0 [ 1458.389384] CPU: 1 PID: 21853 Comm: syz-executor0 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 1458.397998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1458.407369] Call Trace: [ 1458.409959] dump_stack+0x244/0x39d [ 1458.413603] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1458.418801] ? debug_smp_processor_id+0x1c/0x20 [ 1458.423469] ? perf_trace_lock+0x14d/0x7a0 [ 1458.427717] should_fail.cold.4+0xa/0x17 [ 1458.431793] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1458.436911] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1458.442447] ? check_preemption_disabled+0x48/0x280 [ 1458.447483] ? debug_smp_processor_id+0x1c/0x20 [ 1458.452166] ? perf_trace_lock+0x14d/0x7a0 [ 1458.456405] ? graph_lock+0x270/0x270 [ 1458.460216] ? find_held_lock+0x36/0x1c0 [ 1458.464288] ? __lock_is_held+0xb5/0x140 [ 1458.468374] ? perf_trace_sched_process_exec+0x860/0x860 [ 1458.473847] ? find_held_lock+0x36/0x1c0 [ 1458.477911] __should_failslab+0x124/0x180 [ 1458.482142] should_failslab+0x9/0x14 [ 1458.485937] kmem_cache_alloc+0x2be/0x730 [ 1458.490106] ? find_held_lock+0x36/0x1c0 [ 1458.494178] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1458.499227] __kernfs_new_node+0x127/0x8d0 [ 1458.503499] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1458.508297] ? kasan_check_write+0x14/0x20 [ 1458.512538] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1458.517475] ? __kernfs_new_node+0x697/0x8d0 [ 1458.521878] ? wait_for_completion+0x8a0/0x8a0 [ 1458.526474] ? graph_lock+0x270/0x270 [ 1458.530270] ? kasan_check_write+0x14/0x20 [ 1458.534502] ? __lock_is_held+0xb5/0x140 [ 1458.538572] ? wait_for_completion+0x8a0/0x8a0 [ 1458.543180] ? mutex_unlock+0xd/0x10 [ 1458.546906] ? kernfs_activate+0x21a/0x2c0 [ 1458.551152] kernfs_new_node+0x95/0x120 [ 1458.555129] __kernfs_create_file+0x5a/0x340 [ 1458.559543] sysfs_add_file_mode_ns+0x222/0x530 [ 1458.564219] internal_create_group+0x3df/0xd80 [ 1458.568831] ? remove_files.isra.1+0x190/0x190 [ 1458.573455] ? up_write+0x7b/0x220 [ 1458.576995] ? down_write_nested+0x130/0x130 [ 1458.581425] ? down_read+0x120/0x120 [ 1458.585171] sysfs_create_group+0x1f/0x30 [ 1458.589337] lo_ioctl+0x166a/0x22a0 [ 1458.592984] ? lo_rw_aio+0x1ef0/0x1ef0 [ 1458.596875] ? find_held_lock+0x36/0x1c0 [ 1458.600942] ? lo_rw_aio+0x1ef0/0x1ef0 [ 1458.604839] blkdev_ioctl+0x98e/0x21b0 [ 1458.608733] ? blkpg_ioctl+0xc10/0xc10 [ 1458.612622] ? lock_downgrade+0x900/0x900 [ 1458.616764] ? check_preemption_disabled+0x48/0x280 [ 1458.621789] ? kasan_check_read+0x11/0x20 [ 1458.625930] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1458.631222] ? rcu_read_unlock_special+0x370/0x370 [ 1458.636155] ? __fget+0x4d1/0x740 [ 1458.639607] ? ksys_dup3+0x680/0x680 [ 1458.643326] block_ioctl+0xee/0x130 [ 1458.646958] ? blkdev_fallocate+0x400/0x400 [ 1458.651304] do_vfs_ioctl+0x1de/0x1790 [ 1458.655197] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1458.660734] ? ioctl_preallocate+0x300/0x300 [ 1458.665151] ? __fget_light+0x2e9/0x430 [ 1458.669134] ? fget_raw+0x20/0x20 [ 1458.672581] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1458.677603] ? kmem_cache_free+0x24f/0x290 [ 1458.681854] ? putname+0xf7/0x130 [ 1458.685328] ? do_syscall_64+0x9a/0x820 [ 1458.689312] ? do_syscall_64+0x9a/0x820 [ 1458.693289] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1458.697895] ? security_file_ioctl+0x94/0xc0 [ 1458.702324] ksys_ioctl+0xa9/0xd0 [ 1458.705793] __x64_sys_ioctl+0x73/0xb0 [ 1458.709703] do_syscall_64+0x1b9/0x820 [ 1458.713593] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1458.718969] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1458.723918] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1458.728774] ? trace_hardirqs_on_caller+0x310/0x310 [ 1458.733793] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1458.738819] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1458.743834] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1458.748689] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1458.753871] RIP: 0033:0x4573d7 [ 1458.757076] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1458.775986] RSP: 002b:00007f2a4600ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1458.783747] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004573d7 [ 1458.791018] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1458.798283] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1458.805561] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1458.812843] R13: 0000000000000000 R14: 00000000004d8ef0 R15: 0000000000000003 22:59:23 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000900000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000000000001c004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:23 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc020660b, &(0x7f0000000200)={{}, 'port1\x00'}) 22:59:23 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:59:24 executing program 0 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:24 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0045878, &(0x7f0000000200)={{}, 'port1\x00'}) 22:59:24 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) clock_adjtime(0x4, &(0x7f0000000340)={0x0, 0x7, 0x7, 0x1, 0x400, 0x7, 0x6, 0x401, 0x8, 0x4, 0x8, 0x0, 0x8001, 0x9, 0x6, 0x401, 0xffffffffffffff81, 0x5, 0x10001, 0x7ff, 0x186000000000, 0xdb5, 0x3, 0x7, 0x9d30, 0x7}) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$sock_void(r1, 0x1, 0x1b, 0x0, 0x0) shutdown(r2, 0x0) pipe(&(0x7f0000000280)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) prctl$PR_GET_TSC(0x19, &(0x7f0000000040)) 22:59:24 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:59:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000e75000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00002300000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:24 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:59:24 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{0xfffffdfd}, 'port1\x00'}) [ 1459.397528] FAULT_INJECTION: forcing a failure. [ 1459.397528] name failslab, interval 1, probability 0, space 0, times 0 [ 1459.409258] CPU: 1 PID: 21897 Comm: syz-executor0 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 1459.417853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1459.427316] Call Trace: [ 1459.429902] dump_stack+0x244/0x39d [ 1459.433534] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1459.438730] should_fail.cold.4+0xa/0x17 [ 1459.442807] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1459.447922] ? graph_lock+0x270/0x270 [ 1459.451747] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1459.457340] ? check_preemption_disabled+0x48/0x280 [ 1459.462363] ? lock_unpin_lock+0x4a0/0x4a0 [ 1459.466599] ? debug_smp_processor_id+0x1c/0x20 [ 1459.471278] ? perf_trace_lock+0x14d/0x7a0 [ 1459.475527] ? __update_load_avg_se+0xae0/0xae0 [ 1459.480206] ? lock_is_held_type+0x210/0x210 [ 1459.484621] ? update_load_avg+0x387/0x2470 [ 1459.488940] ? __update_load_avg_blocked_se+0x690/0x690 [ 1459.494303] ? graph_lock+0x270/0x270 [ 1459.498107] ? attach_entity_load_avg+0x860/0x860 [ 1459.502988] ? print_usage_bug+0xc0/0xc0 [ 1459.507067] __should_failslab+0x124/0x180 [ 1459.511300] should_failslab+0x9/0x14 [ 1459.515124] kmem_cache_alloc+0x47/0x730 [ 1459.519178] ? lock_downgrade+0x900/0x900 [ 1459.523366] radix_tree_node_alloc.constprop.19+0x1f7/0x370 [ 1459.529141] idr_get_free+0x7a4/0xf70 [ 1459.532962] ? radix_tree_iter_tag_clear+0x90/0x90 [ 1459.537892] ? __save_stack_trace+0x8d/0xf0 [ 1459.542255] ? save_stack+0xa9/0xd0 [ 1459.545879] ? save_stack+0x43/0xd0 [ 1459.549507] ? kasan_kmalloc+0xc7/0xe0 [ 1459.553414] ? kasan_slab_alloc+0x12/0x20 [ 1459.557570] ? kmem_cache_alloc+0x12e/0x730 [ 1459.561903] ? __kernfs_new_node+0x127/0x8d0 [ 1459.566303] ? kernfs_new_node+0x95/0x120 [ 1459.570446] ? internal_create_group+0x5fc/0xd80 [ 1459.575204] ? sysfs_create_group+0x1f/0x30 [ 1459.579528] ? lo_ioctl+0x166a/0x22a0 [ 1459.583332] ? blkdev_ioctl+0x98e/0x21b0 [ 1459.587402] ? block_ioctl+0xee/0x130 [ 1459.591204] ? do_vfs_ioctl+0x1de/0x1790 [ 1459.595271] ? ksys_ioctl+0xa9/0xd0 [ 1459.598907] ? do_syscall_64+0x1b9/0x820 [ 1459.602963] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1459.608337] ? find_held_lock+0x36/0x1c0 [ 1459.612422] idr_alloc_u32+0x1d4/0x3a0 [ 1459.616324] ? __fprop_inc_percpu_max+0x2d0/0x2d0 [ 1459.621164] ? lock_acquire+0x1ed/0x520 [ 1459.625138] ? __kernfs_new_node+0x14e/0x8d0 [ 1459.629559] ? __lock_is_held+0xb5/0x140 [ 1459.633685] idr_alloc_cyclic+0x166/0x350 [ 1459.637863] ? idr_alloc+0x1b0/0x1b0 [ 1459.641583] ? __radix_tree_preload+0x1f7/0x280 [ 1459.646265] __kernfs_new_node+0x1f4/0x8d0 [ 1459.650497] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1459.655285] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1459.660825] ? lock_is_held_type+0x210/0x210 [ 1459.665231] ? debug_smp_processor_id+0x1c/0x20 [ 1459.669897] ? perf_trace_lock+0x14d/0x7a0 [ 1459.674139] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1459.679275] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1459.684392] ? graph_lock+0x270/0x270 [ 1459.688216] ? lock_is_held_type+0x210/0x210 [ 1459.692613] ? print_usage_bug+0xc0/0xc0 [ 1459.696669] ? graph_lock+0x270/0x270 [ 1459.700506] ? enqueue_task_fair+0x24d/0xa50 [ 1459.704914] ? find_held_lock+0x36/0x1c0 [ 1459.708973] kernfs_new_node+0x95/0x120 [ 1459.712951] kernfs_create_dir_ns+0x4d/0x160 [ 1459.717366] internal_create_group+0x5fc/0xd80 [ 1459.721973] ? remove_files.isra.1+0x190/0x190 [ 1459.726574] ? up_write+0x7b/0x220 [ 1459.730125] ? down_write_nested+0x130/0x130 [ 1459.734530] ? down_read+0x120/0x120 [ 1459.738264] sysfs_create_group+0x1f/0x30 [ 1459.742443] lo_ioctl+0x166a/0x22a0 [ 1459.746083] ? lo_rw_aio+0x1ef0/0x1ef0 [ 1459.750000] ? find_held_lock+0x36/0x1c0 [ 1459.754100] ? lo_rw_aio+0x1ef0/0x1ef0 [ 1459.758002] blkdev_ioctl+0x98e/0x21b0 [ 1459.761960] ? blkpg_ioctl+0xc10/0xc10 [ 1459.765855] ? lock_downgrade+0x900/0x900 [ 1459.770009] ? check_preemption_disabled+0x48/0x280 [ 1459.775063] ? kasan_check_read+0x11/0x20 [ 1459.779238] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1459.784525] ? rcu_read_unlock_special+0x370/0x370 [ 1459.789482] ? __fget+0x4d1/0x740 [ 1459.792955] ? ksys_dup3+0x680/0x680 [ 1459.796717] block_ioctl+0xee/0x130 [ 1459.800376] ? blkdev_fallocate+0x400/0x400 [ 1459.804751] do_vfs_ioctl+0x1de/0x1790 [ 1459.808656] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1459.814206] ? ioctl_preallocate+0x300/0x300 [ 1459.818609] ? __fget_light+0x2e9/0x430 [ 1459.822586] ? fget_raw+0x20/0x20 [ 1459.826086] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1459.831113] ? kmem_cache_free+0x24f/0x290 [ 1459.835360] ? putname+0xf7/0x130 [ 1459.838849] ? do_syscall_64+0x9a/0x820 [ 1459.842827] ? do_syscall_64+0x9a/0x820 [ 1459.846817] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1459.851397] ? security_file_ioctl+0x94/0xc0 [ 1459.855825] ksys_ioctl+0xa9/0xd0 [ 1459.859292] __x64_sys_ioctl+0x73/0xb0 [ 1459.863206] do_syscall_64+0x1b9/0x820 [ 1459.867089] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1459.872464] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1459.877402] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1459.882288] ? trace_hardirqs_on_caller+0x310/0x310 [ 1459.887299] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1459.892334] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1459.897352] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1459.902216] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1459.907395] RIP: 0033:0x4573d7 [ 1459.910594] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1459.929487] RSP: 002b:00007f2a4600ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1459.937206] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004573d7 [ 1459.944484] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1459.951747] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1459.959015] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1459.966296] R13: 0000000000000000 R14: 00000000004d8ef0 R15: 0000000000000003 22:59:24 executing program 0 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:24 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:59:24 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{0xfdfdffff00000000}, 'port1\x00'}) [ 1460.227249] FAULT_INJECTION: forcing a failure. [ 1460.227249] name failslab, interval 1, probability 0, space 0, times 0 [ 1460.251055] CPU: 1 PID: 21925 Comm: syz-executor0 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 1460.259737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1460.269127] Call Trace: [ 1460.271754] dump_stack+0x244/0x39d 22:59:25 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f0000000040)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00001020000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) [ 1460.275460] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1460.280717] ? debug_smp_processor_id+0x1c/0x20 [ 1460.285426] ? perf_trace_lock+0x14d/0x7a0 [ 1460.289718] should_fail.cold.4+0xa/0x17 [ 1460.293817] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1460.298967] ? perf_trace_lock+0x14d/0x7a0 [ 1460.303252] ? lock_release+0xa10/0xa10 [ 1460.307258] ? perf_trace_sched_process_exec+0x860/0x860 [ 1460.312765] ? lock_is_held_type+0x210/0x210 [ 1460.317232] ? check_preemption_disabled+0x48/0x280 [ 1460.322308] ? graph_lock+0x270/0x270 [ 1460.326167] ? find_held_lock+0x36/0x1c0 [ 1460.330272] ? __lock_is_held+0xb5/0x140 [ 1460.334391] ? perf_trace_sched_process_exec+0x860/0x860 [ 1460.339877] ? kernfs_activate+0x21a/0x2c0 [ 1460.344206] __should_failslab+0x124/0x180 [ 1460.348455] should_failslab+0x9/0x14 [ 1460.352253] kmem_cache_alloc+0x2be/0x730 [ 1460.356399] ? lock_downgrade+0x900/0x900 [ 1460.360548] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1460.365570] __kernfs_new_node+0x127/0x8d0 [ 1460.369830] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1460.374613] ? graph_lock+0x270/0x270 [ 1460.378443] ? __lock_is_held+0xb5/0x140 [ 1460.382513] ? wait_for_completion+0x8a0/0x8a0 [ 1460.387107] ? mutex_unlock+0xd/0x10 [ 1460.390854] ? kernfs_activate+0x21a/0x2c0 [ 1460.395104] ? kernfs_walk_and_get_ns+0x340/0x340 [ 1460.399960] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1460.405520] ? kernfs_link_sibling+0x1d2/0x3b0 [ 1460.410116] kernfs_new_node+0x95/0x120 [ 1460.414107] __kernfs_create_file+0x5a/0x340 [ 1460.418549] sysfs_add_file_mode_ns+0x222/0x530 [ 1460.423258] internal_create_group+0x3df/0xd80 [ 1460.427889] ? remove_files.isra.1+0x190/0x190 [ 1460.432480] ? up_write+0x7b/0x220 [ 1460.436028] ? down_write_nested+0x130/0x130 [ 1460.440439] ? down_read+0x120/0x120 [ 1460.444194] sysfs_create_group+0x1f/0x30 [ 1460.448368] lo_ioctl+0x166a/0x22a0 [ 1460.452030] ? lo_rw_aio+0x1ef0/0x1ef0 [ 1460.455926] ? find_held_lock+0x36/0x1c0 [ 1460.460004] ? lo_rw_aio+0x1ef0/0x1ef0 [ 1460.463912] blkdev_ioctl+0x98e/0x21b0 [ 1460.467810] ? blkpg_ioctl+0xc10/0xc10 [ 1460.471711] ? lock_downgrade+0x900/0x900 [ 1460.475867] ? check_preemption_disabled+0x48/0x280 [ 1460.480905] ? kasan_check_read+0x11/0x20 [ 1460.485082] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1460.490415] ? rcu_read_unlock_special+0x370/0x370 [ 1460.495377] ? __fget+0x4d1/0x740 [ 1460.498848] ? ksys_dup3+0x680/0x680 [ 1460.502578] block_ioctl+0xee/0x130 [ 1460.506210] ? blkdev_fallocate+0x400/0x400 [ 1460.510575] do_vfs_ioctl+0x1de/0x1790 [ 1460.514489] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1460.520095] ? ioctl_preallocate+0x300/0x300 [ 1460.524531] ? __fget_light+0x2e9/0x430 [ 1460.528498] ? fget_raw+0x20/0x20 [ 1460.531945] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1460.536979] ? kmem_cache_free+0x24f/0x290 [ 1460.541245] ? putname+0xf7/0x130 [ 1460.544724] ? do_syscall_64+0x9a/0x820 [ 1460.548737] ? do_syscall_64+0x9a/0x820 [ 1460.552731] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1460.557328] ? security_file_ioctl+0x94/0xc0 [ 1460.561807] ksys_ioctl+0xa9/0xd0 [ 1460.565292] __x64_sys_ioctl+0x73/0xb0 [ 1460.569215] do_syscall_64+0x1b9/0x820 [ 1460.573139] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1460.578524] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1460.583468] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1460.588325] ? trace_hardirqs_on_caller+0x310/0x310 [ 1460.593364] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1460.598423] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1460.603500] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1460.608362] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1460.613568] RIP: 0033:0x4573d7 [ 1460.616780] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1460.635692] RSP: 002b:00007f2a4600ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1460.643404] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004573d7 [ 1460.650685] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1460.657960] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1460.665237] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 22:59:25 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:59:25 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{0xfdfdffff}, 'port1\x00'}) [ 1460.672507] R13: 0000000000000000 R14: 00000000004d8ef0 R15: 0000000000000003 22:59:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000fcfdffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:25 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:59:25 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{0x0, 0xfffffdfd}, 'port1\x00'}) 22:59:25 executing program 0 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000fffffdfc004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) [ 1461.048402] FAULT_INJECTION: forcing a failure. [ 1461.048402] name failslab, interval 1, probability 0, space 0, times 0 [ 1461.062514] CPU: 0 PID: 21961 Comm: syz-executor0 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 1461.071162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1461.080627] Call Trace: [ 1461.083292] dump_stack+0x244/0x39d [ 1461.087000] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1461.092223] ? debug_smp_processor_id+0x1c/0x20 [ 1461.096906] ? perf_trace_lock+0x14d/0x7a0 [ 1461.101160] should_fail.cold.4+0xa/0x17 [ 1461.105237] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1461.110348] ? perf_trace_lock+0x14d/0x7a0 [ 1461.114593] ? lock_release+0xa10/0xa10 [ 1461.118575] ? perf_trace_sched_process_exec+0x860/0x860 [ 1461.124154] ? lock_is_held_type+0x210/0x210 [ 1461.128597] ? check_preemption_disabled+0x48/0x280 [ 1461.133645] ? graph_lock+0x270/0x270 [ 1461.137481] ? find_held_lock+0x36/0x1c0 [ 1461.141558] ? __lock_is_held+0xb5/0x140 [ 1461.145630] ? __x64_sys_linkat+0x38/0x150 [ 1461.150240] ? perf_trace_sched_process_exec+0x860/0x860 [ 1461.155746] ? kernfs_activate+0x21a/0x2c0 [ 1461.160003] __should_failslab+0x124/0x180 [ 1461.164256] should_failslab+0x9/0x14 [ 1461.168096] kmem_cache_alloc+0x2be/0x730 [ 1461.172263] ? lock_downgrade+0x900/0x900 [ 1461.176416] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1461.181458] __kernfs_new_node+0x127/0x8d0 [ 1461.185740] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1461.190512] ? graph_lock+0x270/0x270 [ 1461.194318] ? __lock_is_held+0xb5/0x140 [ 1461.198394] ? wait_for_completion+0x8a0/0x8a0 [ 1461.202984] ? mutex_unlock+0xd/0x10 [ 1461.206709] ? kernfs_activate+0x21a/0x2c0 [ 1461.210970] ? kernfs_walk_and_get_ns+0x340/0x340 [ 1461.215838] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1461.221384] ? kernfs_link_sibling+0x1d2/0x3b0 [ 1461.225988] kernfs_new_node+0x95/0x120 [ 1461.229974] __kernfs_create_file+0x5a/0x340 [ 1461.234406] sysfs_add_file_mode_ns+0x222/0x530 [ 1461.239110] internal_create_group+0x3df/0xd80 [ 1461.243732] ? remove_files.isra.1+0x190/0x190 [ 1461.248337] ? up_write+0x7b/0x220 [ 1461.251878] ? down_write_nested+0x130/0x130 [ 1461.256290] ? down_read+0x120/0x120 [ 1461.260044] sysfs_create_group+0x1f/0x30 [ 1461.264212] lo_ioctl+0x166a/0x22a0 [ 1461.267902] ? lo_rw_aio+0x1ef0/0x1ef0 [ 1461.271829] ? find_held_lock+0x36/0x1c0 [ 1461.275906] ? lo_rw_aio+0x1ef0/0x1ef0 [ 1461.279818] blkdev_ioctl+0x98e/0x21b0 [ 1461.283729] ? blkpg_ioctl+0xc10/0xc10 [ 1461.287630] ? lock_downgrade+0x900/0x900 [ 1461.291774] ? check_preemption_disabled+0x48/0x280 [ 1461.296796] ? kasan_check_read+0x11/0x20 [ 1461.300947] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1461.306252] ? rcu_read_unlock_special+0x370/0x370 [ 1461.311239] ? __fget+0x4d1/0x740 [ 1461.314729] ? ksys_dup3+0x680/0x680 [ 1461.318485] block_ioctl+0xee/0x130 [ 1461.322127] ? blkdev_fallocate+0x400/0x400 [ 1461.326499] do_vfs_ioctl+0x1de/0x1790 [ 1461.330404] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1461.335958] ? ioctl_preallocate+0x300/0x300 [ 1461.340372] ? __fget_light+0x2e9/0x430 [ 1461.344350] ? fget_raw+0x20/0x20 [ 1461.347810] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1461.352837] ? kmem_cache_free+0x24f/0x290 [ 1461.357101] ? putname+0xf7/0x130 [ 1461.360558] ? do_syscall_64+0x9a/0x820 [ 1461.364539] ? do_syscall_64+0x9a/0x820 [ 1461.368518] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1461.373135] ? security_file_ioctl+0x94/0xc0 [ 1461.377551] ksys_ioctl+0xa9/0xd0 [ 1461.381014] __x64_sys_ioctl+0x73/0xb0 [ 1461.384957] do_syscall_64+0x1b9/0x820 [ 1461.388861] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1461.394235] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1461.399172] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1461.404052] ? trace_hardirqs_on_caller+0x310/0x310 [ 1461.409100] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1461.414149] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1461.419198] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1461.424084] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1461.429296] RIP: 0033:0x4573d7 22:59:26 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:59:26 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{0x0, 0xfdfdffff00000000}, 'port1\x00'}) [ 1461.432488] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1461.451406] RSP: 002b:00007f2a4600ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1461.459142] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004573d7 [ 1461.466419] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1461.473724] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1461.481016] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1461.488294] R13: 0000000000000000 R14: 00000000004d8ef0 R15: 0000000000000003 22:59:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000feffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:26 executing program 1: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x0, 0x400200) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000440)={0x0, 0x200, 0x10}, &(0x7f0000000480)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000580)={r2, 0x10001}, 0x8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@dev, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000540)=0x4, 0x4) connect$vsock_dgram(r3, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r3, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) open(&(0x7f0000000000)='./file0\x00', 0x800, 0x100) 22:59:26 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:59:26 executing program 0 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:26 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{0x0, 0xfdfdffff}, 'port1\x00'}) 22:59:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000002004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:26 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431fdfdffff00"}) [ 1461.874624] FAULT_INJECTION: forcing a failure. [ 1461.874624] name failslab, interval 1, probability 0, space 0, times 0 [ 1461.908107] CPU: 0 PID: 21993 Comm: syz-executor0 Not tainted 4.20.0-rc1-next-20181109+ #110 22:59:26 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) [ 1461.916794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1461.926179] Call Trace: [ 1461.928819] dump_stack+0x244/0x39d [ 1461.932487] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1461.937710] ? debug_smp_processor_id+0x1c/0x20 [ 1461.942416] ? perf_trace_lock+0x14d/0x7a0 [ 1461.946767] should_fail.cold.4+0xa/0x17 [ 1461.950846] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1461.955968] ? perf_trace_lock+0x14d/0x7a0 [ 1461.960210] ? lock_release+0xa10/0xa10 [ 1461.964200] ? perf_trace_sched_process_exec+0x860/0x860 [ 1461.969711] ? lock_is_held_type+0x210/0x210 [ 1461.974126] ? check_preemption_disabled+0x48/0x280 [ 1461.979156] ? graph_lock+0x270/0x270 [ 1461.982960] ? find_held_lock+0x36/0x1c0 [ 1461.987037] ? __lock_is_held+0xb5/0x140 [ 1461.991178] ? lg_input_mapping+0x15d8/0x5140 [ 1461.995715] ? perf_trace_sched_process_exec+0x860/0x860 [ 1462.001187] ? kernfs_activate+0x21a/0x2c0 [ 1462.005459] __should_failslab+0x124/0x180 [ 1462.009743] should_failslab+0x9/0x14 [ 1462.013570] kmem_cache_alloc+0x2be/0x730 [ 1462.017743] ? lock_downgrade+0x900/0x900 [ 1462.021927] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1462.026983] __kernfs_new_node+0x127/0x8d0 [ 1462.031230] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1462.036010] ? graph_lock+0x270/0x270 [ 1462.039841] ? __lock_is_held+0xb5/0x140 [ 1462.043903] ? wait_for_completion+0x8a0/0x8a0 [ 1462.048503] ? mutex_unlock+0xd/0x10 [ 1462.052221] ? kernfs_activate+0x21a/0x2c0 [ 1462.056491] ? kernfs_walk_and_get_ns+0x340/0x340 [ 1462.061340] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1462.066890] ? kernfs_link_sibling+0x1d2/0x3b0 [ 1462.071516] kernfs_new_node+0x95/0x120 [ 1462.075502] __kernfs_create_file+0x5a/0x340 [ 1462.079934] sysfs_add_file_mode_ns+0x222/0x530 [ 1462.084623] internal_create_group+0x3df/0xd80 [ 1462.089224] ? remove_files.isra.1+0x190/0x190 [ 1462.093829] ? up_write+0x7b/0x220 [ 1462.097377] ? down_write_nested+0x130/0x130 [ 1462.101789] ? down_read+0x120/0x120 [ 1462.105538] sysfs_create_group+0x1f/0x30 [ 1462.109714] lo_ioctl+0x166a/0x22a0 [ 1462.113355] ? lo_rw_aio+0x1ef0/0x1ef0 [ 1462.117299] ? find_held_lock+0x36/0x1c0 [ 1462.121435] ? lo_rw_aio+0x1ef0/0x1ef0 [ 1462.125334] blkdev_ioctl+0x98e/0x21b0 [ 1462.129240] ? blkpg_ioctl+0xc10/0xc10 [ 1462.133137] ? lock_downgrade+0x900/0x900 [ 1462.137288] ? check_preemption_disabled+0x48/0x280 [ 1462.142314] ? kasan_check_read+0x11/0x20 [ 1462.146467] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1462.151754] ? rcu_read_unlock_special+0x370/0x370 [ 1462.156712] ? __fget+0x4d1/0x740 [ 1462.160176] ? ksys_dup3+0x680/0x680 [ 1462.163915] block_ioctl+0xee/0x130 [ 1462.167545] ? blkdev_fallocate+0x400/0x400 [ 1462.171884] do_vfs_ioctl+0x1de/0x1790 [ 1462.175787] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1462.181337] ? ioctl_preallocate+0x300/0x300 [ 1462.185748] ? __fget_light+0x2e9/0x430 [ 1462.189732] ? fget_raw+0x20/0x20 [ 1462.193244] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1462.198287] ? kmem_cache_free+0x24f/0x290 [ 1462.202551] ? putname+0xf7/0x130 [ 1462.206044] ? do_syscall_64+0x9a/0x820 [ 1462.210033] ? do_syscall_64+0x9a/0x820 [ 1462.214043] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1462.218667] ? security_file_ioctl+0x94/0xc0 [ 1462.223115] ksys_ioctl+0xa9/0xd0 [ 1462.226613] __x64_sys_ioctl+0x73/0xb0 [ 1462.230521] do_syscall_64+0x1b9/0x820 [ 1462.234406] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1462.239778] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1462.244734] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1462.249618] ? trace_hardirqs_on_caller+0x310/0x310 [ 1462.254657] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1462.259705] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1462.264761] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1462.269656] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1462.274856] RIP: 0033:0x4573d7 [ 1462.278045] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1462.296956] RSP: 002b:00007f2a4600ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1462.304701] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004573d7 [ 1462.311984] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1462.319299] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1462.326589] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1462.333865] R13: 0000000000000000 R14: 00000000004d8ef0 R15: 0000000000000003 22:59:27 executing program 0 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:27 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:59:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000007004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:27 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000fffffdfd00"}) 22:59:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000fff004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) [ 1462.751346] FAULT_INJECTION: forcing a failure. [ 1462.751346] name failslab, interval 1, probability 0, space 0, times 0 [ 1462.765538] CPU: 0 PID: 22031 Comm: syz-executor0 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 1462.774154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1462.783558] Call Trace: [ 1462.786192] dump_stack+0x244/0x39d [ 1462.789857] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1462.795073] ? debug_smp_processor_id+0x1c/0x20 [ 1462.799777] ? perf_trace_lock+0x14d/0x7a0 [ 1462.804047] should_fail.cold.4+0xa/0x17 [ 1462.808127] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1462.813247] ? perf_trace_lock+0x14d/0x7a0 [ 1462.817491] ? lock_release+0xa10/0xa10 [ 1462.821457] ? perf_trace_sched_process_exec+0x860/0x860 [ 1462.826906] ? lock_is_held_type+0x210/0x210 [ 1462.831326] ? check_preemption_disabled+0x48/0x280 [ 1462.836342] ? graph_lock+0x270/0x270 [ 1462.840141] ? find_held_lock+0x36/0x1c0 [ 1462.844206] ? __lock_is_held+0xb5/0x140 [ 1462.848280] ? perf_trace_sched_process_exec+0x860/0x860 [ 1462.853741] ? kernfs_activate+0x21a/0x2c0 [ 1462.857977] __should_failslab+0x124/0x180 [ 1462.862242] should_failslab+0x9/0x14 [ 1462.866053] kmem_cache_alloc+0x2be/0x730 [ 1462.870218] ? lock_downgrade+0x900/0x900 [ 1462.874395] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1462.879417] __kernfs_new_node+0x127/0x8d0 [ 1462.883709] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1462.888463] ? graph_lock+0x270/0x270 [ 1462.892307] ? __lock_is_held+0xb5/0x140 [ 1462.896395] ? wait_for_completion+0x8a0/0x8a0 [ 1462.901003] ? mutex_unlock+0xd/0x10 [ 1462.904725] ? kernfs_activate+0x21a/0x2c0 [ 1462.909002] ? kernfs_walk_and_get_ns+0x340/0x340 [ 1462.913849] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1462.919379] ? kernfs_link_sibling+0x1d2/0x3b0 [ 1462.923965] kernfs_new_node+0x95/0x120 [ 1462.927939] __kernfs_create_file+0x5a/0x340 [ 1462.932382] sysfs_add_file_mode_ns+0x222/0x530 [ 1462.937056] internal_create_group+0x3df/0xd80 [ 1462.941652] ? remove_files.isra.1+0x190/0x190 [ 1462.946247] ? up_write+0x7b/0x220 [ 1462.949781] ? down_write_nested+0x130/0x130 [ 1462.954219] ? down_read+0x120/0x120 [ 1462.957940] sysfs_create_group+0x1f/0x30 [ 1462.962091] lo_ioctl+0x166a/0x22a0 [ 1462.965725] ? lo_rw_aio+0x1ef0/0x1ef0 [ 1462.969651] ? find_held_lock+0x36/0x1c0 [ 1462.973725] ? lo_rw_aio+0x1ef0/0x1ef0 [ 1462.977608] blkdev_ioctl+0x98e/0x21b0 [ 1462.981500] ? blkpg_ioctl+0xc10/0xc10 [ 1462.985387] ? lock_downgrade+0x900/0x900 [ 1462.989529] ? check_preemption_disabled+0x48/0x280 [ 1462.994592] ? kasan_check_read+0x11/0x20 [ 1462.998736] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1463.004034] ? rcu_read_unlock_special+0x370/0x370 [ 1463.008999] ? __fget+0x4d1/0x740 [ 1463.012448] ? ksys_dup3+0x680/0x680 [ 1463.016198] block_ioctl+0xee/0x130 [ 1463.019834] ? blkdev_fallocate+0x400/0x400 [ 1463.024153] do_vfs_ioctl+0x1de/0x1790 [ 1463.028038] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1463.033573] ? ioctl_preallocate+0x300/0x300 [ 1463.037978] ? __fget_light+0x2e9/0x430 [ 1463.041948] ? fget_raw+0x20/0x20 [ 1463.045395] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1463.050414] ? kmem_cache_free+0x24f/0x290 [ 1463.054660] ? putname+0xf7/0x130 [ 1463.058130] ? do_syscall_64+0x9a/0x820 [ 1463.062097] ? do_syscall_64+0x9a/0x820 [ 1463.066073] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1463.070673] ? security_file_ioctl+0x94/0xc0 [ 1463.075115] ksys_ioctl+0xa9/0xd0 [ 1463.078594] __x64_sys_ioctl+0x73/0xb0 [ 1463.082516] do_syscall_64+0x1b9/0x820 [ 1463.086504] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1463.091870] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1463.096791] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1463.101628] ? trace_hardirqs_on_caller+0x310/0x310 [ 1463.106658] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1463.111719] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1463.116736] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1463.121602] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1463.126789] RIP: 0033:0x4573d7 [ 1463.129970] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:59:27 executing program 1: pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x4000) write$P9_RREMOVE(r0, &(0x7f0000000280)={0x7, 0x7b, 0x2}, 0x7) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r3, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000040), &(0x7f0000000240)=0x4) shutdown(r3, 0x0) pipe(&(0x7f0000000380)) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) ioctl$KVM_NMI(r4, 0xae9a) syz_open_dev$audion(&(0x7f0000000400)='/dev/audio#\x00', 0x1, 0x20000) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) write$evdev(r4, &(0x7f0000000440)=[{{0x77359400}, 0x14, 0x2, 0x100000000}, {{r5, r6/1000+30000}, 0x4, 0x40}, {{0x77359400}, 0x0, 0x2, 0xf02}, {{}, 0x17, 0x1, 0x1cb5}, {{0x77359400}, 0x2, 0x3, 0x2}, {{}, 0x17, 0x4, 0x80000001}, {{0x0, 0x7530}, 0x1f, 0x0, 0x4}, {{}, 0x16, 0x8de, 0x5}, {{}, 0x16, 0x4, 0x479d}], 0xd8) 22:59:27 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:59:27 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431fffffdfd00"}) [ 1463.149167] RSP: 002b:00007f2a4600ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1463.156875] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004573d7 [ 1463.164165] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1463.171448] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1463.178717] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1463.185990] R13: 0000000000000000 R14: 00000000004d8ef0 R15: 0000000000000003 22:59:28 executing program 0 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:28 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:59:28 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100fdfdffff00"}) 22:59:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000001004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) [ 1463.482115] FAULT_INJECTION: forcing a failure. [ 1463.482115] name failslab, interval 1, probability 0, space 0, times 0 [ 1463.504827] CPU: 1 PID: 22059 Comm: syz-executor0 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 1463.513511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1463.522879] Call Trace: [ 1463.525471] dump_stack+0x244/0x39d 22:59:28 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) [ 1463.529135] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1463.534410] ? debug_smp_processor_id+0x1c/0x20 [ 1463.539095] ? perf_trace_lock+0x14d/0x7a0 [ 1463.543368] should_fail.cold.4+0xa/0x17 [ 1463.547450] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1463.552571] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1463.558106] ? wake_up_klogd+0x11a/0x180 [ 1463.562179] ? console_device+0xc0/0xc0 [ 1463.566154] ? __down_trylock_console_sem+0x151/0x1f0 [ 1463.571383] ? graph_lock+0x270/0x270 [ 1463.575196] ? vprintk_emit+0x293/0x990 [ 1463.579174] ? find_held_lock+0x36/0x1c0 [ 1463.583242] ? __lock_is_held+0xb5/0x140 [ 1463.587390] ? g4x_compute_pipe_wm+0x1608/0x23c0 [ 1463.592186] ? perf_trace_sched_process_exec+0x860/0x860 [ 1463.597668] ? vprintk_default+0x28/0x30 [ 1463.601746] __should_failslab+0x124/0x180 [ 1463.605976] should_failslab+0x9/0x14 [ 1463.609816] kmem_cache_alloc_trace+0x2d7/0x750 [ 1463.614506] kobject_uevent_env+0x2f3/0x101e [ 1463.618918] kobject_uevent+0x1f/0x24 [ 1463.622716] lo_ioctl+0x16f1/0x22a0 [ 1463.626370] ? lo_rw_aio+0x1ef0/0x1ef0 [ 1463.630282] ? find_held_lock+0x36/0x1c0 [ 1463.634368] ? lo_rw_aio+0x1ef0/0x1ef0 [ 1463.638259] blkdev_ioctl+0x98e/0x21b0 [ 1463.642152] ? blkpg_ioctl+0xc10/0xc10 [ 1463.646101] ? lock_downgrade+0x900/0x900 [ 1463.650264] ? check_preemption_disabled+0x48/0x280 [ 1463.655309] ? kasan_check_read+0x11/0x20 [ 1463.659469] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1463.664740] ? rcu_read_unlock_special+0x370/0x370 [ 1463.669690] ? __fget+0x4d1/0x740 [ 1463.673183] ? ksys_dup3+0x680/0x680 [ 1463.676925] block_ioctl+0xee/0x130 [ 1463.680561] ? blkdev_fallocate+0x400/0x400 [ 1463.684893] do_vfs_ioctl+0x1de/0x1790 [ 1463.688813] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1463.694383] ? ioctl_preallocate+0x300/0x300 [ 1463.698805] ? __fget_light+0x2e9/0x430 [ 1463.702778] ? fget_raw+0x20/0x20 [ 1463.706245] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1463.711283] ? kmem_cache_free+0x24f/0x290 [ 1463.715538] ? putname+0xf7/0x130 [ 1463.718996] ? do_syscall_64+0x9a/0x820 [ 1463.723019] ? do_syscall_64+0x9a/0x820 [ 1463.727003] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1463.731588] ? security_file_ioctl+0x94/0xc0 [ 1463.735996] ksys_ioctl+0xa9/0xd0 [ 1463.739445] __x64_sys_ioctl+0x73/0xb0 [ 1463.743335] do_syscall_64+0x1b9/0x820 [ 1463.747239] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1463.752609] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1463.757564] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1463.762420] ? trace_hardirqs_on_caller+0x310/0x310 [ 1463.767443] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1463.772473] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1463.777507] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1463.782354] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1463.787545] RIP: 0033:0x4573d7 [ 1463.790734] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1463.809650] RSP: 002b:00007f2a4600ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1463.817387] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004573d7 [ 1463.824660] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 22:59:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000001020004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:28 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000fffffdfd00"}) [ 1463.831935] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1463.839224] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1463.846490] R13: 0000000000000000 R14: 00000000004d8ef0 R15: 0000000000000003 22:59:28 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100fffffdfd00"}) 22:59:28 executing program 0 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:29 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000240)={0x5, {0x7fff, 0x1, 0x9, 0x5}}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = socket(0x5, 0x4, 0x6) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000340)=0x4) connect$vsock_dgram(r1, &(0x7f0000000280)={0x28, 0x0, 0x0, @host}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:29 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:59:29 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000fdfdffff00"}) 22:59:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000007fffffff004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) [ 1464.339134] FAULT_INJECTION: forcing a failure. [ 1464.339134] name failslab, interval 1, probability 0, space 0, times 0 22:59:29 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000fffffdfd00"}) 22:59:29 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) [ 1464.399615] CPU: 0 PID: 22094 Comm: syz-executor0 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 1464.408284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1464.417663] Call Trace: [ 1464.420333] dump_stack+0x244/0x39d [ 1464.423987] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1464.429211] ? debug_smp_processor_id+0x1c/0x20 [ 1464.433914] ? perf_trace_lock+0x14d/0x7a0 [ 1464.438188] should_fail.cold.4+0xa/0x17 [ 1464.442283] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1464.447414] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1464.452991] ? wake_up_klogd+0x11a/0x180 [ 1464.457074] ? console_device+0xc0/0xc0 [ 1464.461077] ? __down_trylock_console_sem+0x151/0x1f0 [ 1464.466277] ? graph_lock+0x270/0x270 [ 1464.470084] ? vprintk_emit+0x293/0x990 [ 1464.474081] ? find_held_lock+0x36/0x1c0 [ 1464.478161] ? __lock_is_held+0xb5/0x140 [ 1464.482249] ? perf_trace_sched_process_exec+0x860/0x860 [ 1464.487730] ? vprintk_default+0x28/0x30 [ 1464.491808] __should_failslab+0x124/0x180 [ 1464.496040] should_failslab+0x9/0x14 [ 1464.499835] kmem_cache_alloc_trace+0x2d7/0x750 [ 1464.504517] kobject_uevent_env+0x2f3/0x101e [ 1464.508928] kobject_uevent+0x1f/0x24 [ 1464.512741] lo_ioctl+0x16f1/0x22a0 [ 1464.516407] ? lo_rw_aio+0x1ef0/0x1ef0 [ 1464.520288] ? find_held_lock+0x36/0x1c0 [ 1464.524369] ? lo_rw_aio+0x1ef0/0x1ef0 [ 1464.528260] blkdev_ioctl+0x98e/0x21b0 [ 1464.532141] ? blkpg_ioctl+0xc10/0xc10 [ 1464.536040] ? lock_downgrade+0x900/0x900 [ 1464.540182] ? check_preemption_disabled+0x48/0x280 [ 1464.545217] ? kasan_check_read+0x11/0x20 [ 1464.549379] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1464.554670] ? rcu_read_unlock_special+0x370/0x370 [ 1464.559644] ? __fget+0x4d1/0x740 [ 1464.563144] ? ksys_dup3+0x680/0x680 [ 1464.566869] block_ioctl+0xee/0x130 [ 1464.570502] ? blkdev_fallocate+0x400/0x400 [ 1464.574836] do_vfs_ioctl+0x1de/0x1790 [ 1464.578726] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1464.584260] ? ioctl_preallocate+0x300/0x300 [ 1464.588665] ? __fget_light+0x2e9/0x430 [ 1464.592665] ? fget_raw+0x20/0x20 [ 1464.596136] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1464.601172] ? kmem_cache_free+0x24f/0x290 [ 1464.605402] ? putname+0xf7/0x130 [ 1464.608863] ? do_syscall_64+0x9a/0x820 [ 1464.612835] ? do_syscall_64+0x9a/0x820 [ 1464.616821] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1464.621399] ? security_file_ioctl+0x94/0xc0 [ 1464.625805] ksys_ioctl+0xa9/0xd0 [ 1464.629269] __x64_sys_ioctl+0x73/0xb0 [ 1464.633156] do_syscall_64+0x1b9/0x820 [ 1464.637072] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1464.642436] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1464.647394] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1464.652262] ? trace_hardirqs_on_caller+0x310/0x310 [ 1464.657271] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1464.662299] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1464.667337] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1464.672186] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1464.677382] RIP: 0033:0x4573d7 [ 1464.680580] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1464.699490] RSP: 002b:00007f2a4600ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1464.707196] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004573d7 [ 1464.714493] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1464.721756] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1464.729028] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1464.736303] R13: 0000000000000000 R14: 00000000004d8ef0 R15: 0000000000000003 22:59:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000900000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:29 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r3, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r4 = accept$inet6(0xffffffffffffffff, &(0x7f0000000940)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f0000000980)=0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000009c0)={0x0, 0x2a, "782431856eca711395b6bcf7c807beb00f5b35547f4101e6d24e2097a74290b05c4d00ed6c207cd40d3e"}, &(0x7f0000000a00)=0x32) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000a40)={r5}, &(0x7f0000000a80)=0x8) shutdown(r3, 0x0) r6 = dup2(r2, r1) ioctl$SNDRV_TIMER_IOCTL_START(r6, 0x54a0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r7, 0x84, 0x1f, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e21, 0xff, @empty, 0x2}}, 0x6}, &(0x7f0000000280)=0x90) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000880)={r8, @in={{0x2, 0x4e21, @rand_addr=0xa00000000000000}}, 0x3, 0x20d, 0xff, 0x7, 0xc8}, 0x98) write$uinput_user_dev(r7, &(0x7f0000000340)={'syz0\x00', {0xc9a, 0x2, 0x1ff000000, 0x1}, 0x25, [0x100000001, 0x6, 0x80000001, 0x101, 0x4, 0x0, 0x5, 0x3, 0xb8, 0x9, 0x80, 0x8, 0x0, 0x7f, 0x4, 0xf2b7, 0x20, 0x4, 0x4, 0x544224c2, 0xfe, 0x81, 0x6, 0x81, 0x3, 0x0, 0xb70, 0x800, 0xba98, 0x1ff, 0x4, 0x5, 0xffffffffffffff81, 0xffffffff, 0x5, 0x1000, 0x4, 0x1, 0x0, 0xffff, 0x6, 0x4, 0x100000000, 0x1, 0x8, 0x2, 0x20, 0x5, 0x8, 0x6, 0x7ff, 0x7fff, 0x7, 0x260, 0x0, 0xc616, 0xdeab, 0x20, 0xfffffffffffffffa, 0x400, 0x0, 0x0, 0x6, 0x4], [0x7, 0x2, 0x5, 0x4, 0xf8c3, 0x81, 0x3, 0x0, 0x6, 0x101, 0x1, 0x7, 0x0, 0x1, 0x3, 0x44, 0x100, 0x1bb4038f80000, 0x101, 0xfffffffffffffff9, 0x1e54, 0x0, 0x2, 0x7, 0xfff, 0x2, 0x2, 0x200, 0x200, 0x0, 0x7, 0x2, 0x4, 0x2d, 0x1, 0xfffffffffffffc00, 0x1, 0xf9, 0x1000, 0x4, 0x4, 0x3f, 0x20, 0x54, 0x2, 0x2, 0x6f, 0x0, 0x8, 0x5, 0x5, 0x200, 0x101, 0x0, 0x1, 0x6dfa, 0x8, 0x1, 0xff, 0x7, 0x1, 0x4, 0x8, 0x9], [0x956, 0x4, 0x7377, 0x6, 0x1000, 0x4, 0x10001, 0x6, 0x0, 0x7fff, 0x9, 0xff, 0x2, 0x47a4, 0x8, 0x1, 0xffffffffffffffe1, 0x1, 0xd9, 0xfffffffffffffe01, 0x7fffffff, 0x6, 0x1, 0x4, 0x400, 0x400, 0x412, 0x9, 0x401, 0x2, 0x80000000, 0x2, 0x100000001, 0xe62b, 0xfaf1, 0x1, 0x10001, 0x0, 0x1, 0xffffffffffffffc0, 0x308f7830, 0x5, 0x8, 0x200, 0x0, 0x9, 0x80, 0x8, 0x8, 0x1ff, 0x0, 0x6, 0x0, 0x0, 0x1, 0xffffffffffffffc0, 0x6, 0x8, 0xffffffff, 0x91, 0x20, 0x40, 0xe3, 0x8], [0x5484, 0x6, 0x5, 0x4, 0x5ba, 0xfffffffffffffffe, 0x5, 0x80000000, 0x28e, 0xff80000, 0x3ff, 0x9, 0x1000, 0x80, 0x2, 0x8886, 0x8b, 0x82, 0x9, 0x1, 0x3, 0xfff, 0x100000001, 0xab7e37, 0x2, 0x5, 0x1, 0x1, 0x40e, 0x100000000, 0x3, 0x9, 0xfffffffffffffc01, 0x80000000, 0x200, 0x4, 0xfe, 0x2aa7, 0x5, 0x10001, 0x9, 0x3, 0x100, 0x7, 0x80000001, 0xef, 0x286, 0x101, 0x80000000, 0xeb, 0x8, 0x4a1, 0x8001, 0x2, 0x9, 0xfd59, 0x7fffffff, 0x0, 0x1000000000, 0x8253, 0x7, 0x2eb, 0x40, 0x3]}, 0x45c) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$RTC_VL_CLR(r6, 0x7014) 22:59:29 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000fffffdfd00"}) 22:59:29 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:59:29 executing program 0 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:29 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000fffffdfd00"}) 22:59:29 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:59:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000700000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) [ 1465.089045] FAULT_INJECTION: forcing a failure. [ 1465.089045] name failslab, interval 1, probability 0, space 0, times 0 [ 1465.101006] CPU: 0 PID: 22139 Comm: syz-executor0 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 1465.109592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1465.118954] Call Trace: [ 1465.121548] dump_stack+0x244/0x39d [ 1465.125199] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1465.130402] ? debug_smp_processor_id+0x1c/0x20 [ 1465.135091] ? perf_trace_lock+0x14d/0x7a0 [ 1465.139323] should_fail.cold.4+0xa/0x17 [ 1465.143393] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1465.148742] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1465.154296] ? wake_up_klogd+0x11a/0x180 [ 1465.158371] ? console_device+0xc0/0xc0 [ 1465.162339] ? __down_trylock_console_sem+0x151/0x1f0 [ 1465.167539] ? graph_lock+0x270/0x270 [ 1465.171389] ? vprintk_emit+0x293/0x990 [ 1465.175416] ? find_held_lock+0x36/0x1c0 [ 1465.179522] ? __lock_is_held+0xb5/0x140 [ 1465.183671] ? perf_trace_sched_process_exec+0x860/0x860 [ 1465.189172] ? vprintk_default+0x28/0x30 [ 1465.193244] __should_failslab+0x124/0x180 [ 1465.197508] should_failslab+0x9/0x14 [ 1465.201303] kmem_cache_alloc_trace+0x2d7/0x750 [ 1465.205973] kobject_uevent_env+0x2f3/0x101e [ 1465.210386] kobject_uevent+0x1f/0x24 [ 1465.214222] lo_ioctl+0x16f1/0x22a0 [ 1465.217866] ? lo_rw_aio+0x1ef0/0x1ef0 [ 1465.221781] ? find_held_lock+0x36/0x1c0 [ 1465.225835] ? lo_rw_aio+0x1ef0/0x1ef0 [ 1465.229722] blkdev_ioctl+0x98e/0x21b0 [ 1465.233617] ? blkpg_ioctl+0xc10/0xc10 [ 1465.237513] ? lock_downgrade+0x900/0x900 [ 1465.241703] ? check_preemption_disabled+0x48/0x280 [ 1465.246727] ? kasan_check_read+0x11/0x20 [ 1465.250892] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1465.256177] ? rcu_read_unlock_special+0x370/0x370 [ 1465.261123] ? __fget+0x4d1/0x740 [ 1465.264574] ? ksys_dup3+0x680/0x680 [ 1465.268309] block_ioctl+0xee/0x130 [ 1465.271951] ? blkdev_fallocate+0x400/0x400 [ 1465.276282] do_vfs_ioctl+0x1de/0x1790 [ 1465.280215] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1465.285774] ? ioctl_preallocate+0x300/0x300 [ 1465.290221] ? __fget_light+0x2e9/0x430 [ 1465.294207] ? fget_raw+0x20/0x20 [ 1465.297655] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1465.302712] ? kmem_cache_free+0x24f/0x290 [ 1465.306949] ? putname+0xf7/0x130 [ 1465.310405] ? do_syscall_64+0x9a/0x820 [ 1465.314388] ? do_syscall_64+0x9a/0x820 [ 1465.318371] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1465.322976] ? security_file_ioctl+0x94/0xc0 [ 1465.327415] ksys_ioctl+0xa9/0xd0 [ 1465.330878] __x64_sys_ioctl+0x73/0xb0 [ 1465.334759] do_syscall_64+0x1b9/0x820 [ 1465.338648] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1465.344050] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1465.348996] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1465.353836] ? trace_hardirqs_on_caller+0x310/0x310 [ 1465.358865] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1465.363910] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1465.368949] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1465.373852] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1465.379044] RIP: 0033:0x4573d7 [ 1465.382240] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1465.401147] RSP: 002b:00007f2a4600ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1465.408851] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004573d7 [ 1465.416129] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1465.423409] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1465.430694] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1465.437994] R13: 0000000000000000 R14: 00000000004d8ef0 R15: 0000000000000003 22:59:30 executing program 0 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:30 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:59:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000fffffff400000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:30 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000fdfdffff00"}) 22:59:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000002300000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) [ 1465.670545] FAULT_INJECTION: forcing a failure. [ 1465.670545] name failslab, interval 1, probability 0, space 0, times 0 [ 1465.707855] CPU: 0 PID: 22161 Comm: syz-executor0 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 1465.716522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1465.725892] Call Trace: [ 1465.728490] dump_stack+0x244/0x39d [ 1465.732147] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1465.737362] ? debug_smp_processor_id+0x1c/0x20 [ 1465.742060] ? perf_trace_lock+0x14d/0x7a0 [ 1465.746307] should_fail.cold.4+0xa/0x17 [ 1465.750371] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1465.755489] ? graph_lock+0x270/0x270 [ 1465.759285] ? kasan_kmalloc+0xc7/0xe0 [ 1465.763193] ? kmem_cache_alloc_trace+0x152/0x750 [ 1465.768053] ? kobject_uevent_env+0x2f3/0x101e [ 1465.772644] ? kobject_uevent+0x1f/0x24 [ 1465.776741] ? lo_ioctl+0x16f1/0x22a0 [ 1465.780547] ? find_held_lock+0x36/0x1c0 [ 1465.784623] ? __lock_is_held+0xb5/0x140 [ 1465.788729] ? perf_trace_sched_process_exec+0x860/0x860 [ 1465.794208] __should_failslab+0x124/0x180 [ 1465.798444] should_failslab+0x9/0x14 [ 1465.802245] __kmalloc+0x2e0/0x760 [ 1465.805780] ? kobject_uevent_env+0x2f3/0x101e [ 1465.810368] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1465.815393] ? kobject_get_path+0xc2/0x1b0 [ 1465.819670] ? kmem_cache_alloc_trace+0x353/0x750 [ 1465.824533] kobject_get_path+0xc2/0x1b0 [ 1465.828595] kobject_uevent_env+0x314/0x101e [ 1465.833031] kobject_uevent+0x1f/0x24 [ 1465.836836] lo_ioctl+0x16f1/0x22a0 [ 1465.840491] ? lo_rw_aio+0x1ef0/0x1ef0 [ 1465.844374] ? find_held_lock+0x36/0x1c0 [ 1465.848433] ? lo_rw_aio+0x1ef0/0x1ef0 [ 1465.852319] blkdev_ioctl+0x98e/0x21b0 [ 1465.856220] ? blkpg_ioctl+0xc10/0xc10 [ 1465.860123] ? lock_downgrade+0x900/0x900 [ 1465.864259] ? check_preemption_disabled+0x48/0x280 [ 1465.869273] ? kasan_check_read+0x11/0x20 [ 1465.873426] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1465.878758] ? rcu_read_unlock_special+0x370/0x370 [ 1465.883703] ? __fget+0x4d1/0x740 [ 1465.887153] ? ksys_dup3+0x680/0x680 [ 1465.890882] block_ioctl+0xee/0x130 [ 1465.894509] ? blkdev_fallocate+0x400/0x400 [ 1465.898854] do_vfs_ioctl+0x1de/0x1790 [ 1465.902749] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1465.908291] ? ioctl_preallocate+0x300/0x300 [ 1465.912739] ? __fget_light+0x2e9/0x430 [ 1465.916745] ? fget_raw+0x20/0x20 [ 1465.920234] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1465.925252] ? kmem_cache_free+0x24f/0x290 [ 1465.929485] ? putname+0xf7/0x130 [ 1465.932930] ? do_syscall_64+0x9a/0x820 [ 1465.936896] ? do_syscall_64+0x9a/0x820 [ 1465.940876] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1465.945454] ? security_file_ioctl+0x94/0xc0 [ 1465.949863] ksys_ioctl+0xa9/0xd0 [ 1465.953314] __x64_sys_ioctl+0x73/0xb0 [ 1465.957204] do_syscall_64+0x1b9/0x820 [ 1465.961093] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1465.966455] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1465.971378] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1465.976284] ? trace_hardirqs_on_caller+0x310/0x310 [ 1465.981295] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1465.986332] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1465.991357] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1465.996234] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1466.001421] RIP: 0033:0x4573d7 [ 1466.004622] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1466.023545] RSP: 002b:00007f2a4600ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1466.031260] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004573d7 [ 1466.038527] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1466.045800] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1466.053074] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1466.060365] R13: 0000000000000000 R14: 00000000004d8ef0 R15: 0000000000000003 22:59:30 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x8b589d9bb521b7d8, 0x0) write$P9_RLERROR(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="0a02000000010009002a"], 0xa) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) write$P9_ROPEN(r1, &(0x7f0000000380)={0x18, 0x71, 0x2, {{0x9, 0x4, 0x6}, 0x8}}, 0x18) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000003c0)=0xfff) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) nanosleep(&(0x7f0000000280)={0x0, 0x989680}, &(0x7f0000000340)) 22:59:30 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:59:31 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000fffffdfd00"}) 22:59:31 executing program 0 (fault-call:0 fault-nth:21): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:31 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:59:31 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000fffffdfd00"}) [ 1466.315060] FAULT_INJECTION: forcing a failure. [ 1466.315060] name failslab, interval 1, probability 0, space 0, times 0 [ 1466.327697] CPU: 1 PID: 22193 Comm: syz-executor0 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 1466.336295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1466.345687] Call Trace: [ 1466.348300] dump_stack+0x244/0x39d [ 1466.351940] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1466.357146] ? debug_smp_processor_id+0x1c/0x20 [ 1466.361816] ? perf_trace_lock+0x14d/0x7a0 [ 1466.366049] should_fail.cold.4+0xa/0x17 [ 1466.370111] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1466.375256] ? __save_stack_trace+0x8d/0xf0 [ 1466.379635] ? graph_lock+0x270/0x270 [ 1466.383445] ? save_stack+0xa9/0xd0 [ 1466.387075] ? save_stack+0x43/0xd0 [ 1466.390736] ? find_held_lock+0x36/0x1c0 [ 1466.394804] ? __lock_is_held+0xb5/0x140 [ 1466.398899] ? graph_lock+0x270/0x270 [ 1466.402732] ? perf_trace_sched_process_exec+0x860/0x860 [ 1466.408181] ? check_preemption_disabled+0x48/0x280 [ 1466.413224] __should_failslab+0x124/0x180 [ 1466.417487] should_failslab+0x9/0x14 [ 1466.421319] kmem_cache_alloc_node_trace+0x270/0x740 [ 1466.426447] __kmalloc_node_track_caller+0x3c/0x70 [ 1466.431385] __kmalloc_reserve.isra.38+0x41/0xe0 [ 1466.436148] __alloc_skb+0x150/0x770 [ 1466.439883] ? netdev_alloc_frag+0x1f0/0x1f0 [ 1466.444330] ? kasan_check_read+0x11/0x20 [ 1466.448512] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1466.453799] ? rcu_read_unlock_special+0x370/0x370 [ 1466.458792] ? netlink_has_listeners+0x2cb/0x4a0 [ 1466.463556] ? netlink_tap_init_net+0x3d0/0x3d0 [ 1466.468249] alloc_uevent_skb+0x84/0x1da [ 1466.472320] kobject_uevent_env+0xa52/0x101e [ 1466.476749] kobject_uevent+0x1f/0x24 [ 1466.480567] lo_ioctl+0x16f1/0x22a0 [ 1466.484214] ? lo_rw_aio+0x1ef0/0x1ef0 [ 1466.488123] ? find_held_lock+0x36/0x1c0 [ 1466.492212] ? lo_rw_aio+0x1ef0/0x1ef0 [ 1466.496131] blkdev_ioctl+0x98e/0x21b0 [ 1466.500027] ? blkpg_ioctl+0xc10/0xc10 [ 1466.503915] ? lock_downgrade+0x900/0x900 [ 1466.508104] ? check_preemption_disabled+0x48/0x280 [ 1466.513134] ? kasan_check_read+0x11/0x20 [ 1466.517302] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1466.522618] ? rcu_read_unlock_special+0x370/0x370 [ 1466.527580] ? __fget+0x4d1/0x740 [ 1466.531041] ? ksys_dup3+0x680/0x680 [ 1466.534763] block_ioctl+0xee/0x130 [ 1466.538397] ? blkdev_fallocate+0x400/0x400 [ 1466.542732] do_vfs_ioctl+0x1de/0x1790 [ 1466.546630] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1466.552190] ? ioctl_preallocate+0x300/0x300 [ 1466.556628] ? __fget_light+0x2e9/0x430 [ 1466.560613] ? fget_raw+0x20/0x20 [ 1466.564099] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1466.569164] ? kmem_cache_free+0x24f/0x290 [ 1466.573423] ? putname+0xf7/0x130 [ 1466.576877] ? do_syscall_64+0x9a/0x820 [ 1466.580860] ? do_syscall_64+0x9a/0x820 [ 1466.584858] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1466.589467] ? security_file_ioctl+0x94/0xc0 [ 1466.593887] ksys_ioctl+0xa9/0xd0 [ 1466.597341] __x64_sys_ioctl+0x73/0xb0 [ 1466.601257] do_syscall_64+0x1b9/0x820 [ 1466.605154] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1466.610518] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1466.615444] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1466.620302] ? trace_hardirqs_on_caller+0x310/0x310 [ 1466.625325] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1466.630342] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1466.635399] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1466.640277] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1466.645470] RIP: 0033:0x4573d7 [ 1466.648670] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1466.667602] RSP: 002b:00007f2a4600ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1466.675337] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004573d7 [ 1466.682604] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1466.689878] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1466.697169] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1466.704467] R13: 0000000000000000 R14: 00000000004d8ef0 R15: 0000000000000003 22:59:31 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:59:31 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000fffffdfd00"}) 22:59:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000001100000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:31 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:59:31 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000fdfdffff00"}) 22:59:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000fff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:31 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r3, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r3, 0x0) ioctl$int_out(r2, 0x5460, &(0x7f0000000040)) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000340)) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4068aea3, &(0x7f0000000240)={0xd25d8e4c0240da06, 0x0, [0x27b, 0x401, 0x9, 0x1]}) 22:59:31 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000fffffdfd00"}) 22:59:31 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:59:31 executing program 0 (fault-call:0 fault-nth:22): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000007a000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) [ 1467.249861] FAULT_INJECTION: forcing a failure. [ 1467.249861] name failslab, interval 1, probability 0, space 0, times 0 [ 1467.264818] CPU: 1 PID: 22239 Comm: syz-executor0 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 1467.273444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1467.282824] Call Trace: [ 1467.285421] dump_stack+0x244/0x39d [ 1467.289071] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1467.294279] ? debug_smp_processor_id+0x1c/0x20 [ 1467.298943] ? perf_trace_lock+0x14d/0x7a0 [ 1467.303175] should_fail.cold.4+0xa/0x17 [ 1467.307247] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1467.312353] ? lock_release+0xa10/0xa10 [ 1467.316324] ? perf_trace_sched_process_exec+0x860/0x860 [ 1467.321777] ? graph_lock+0x270/0x270 [ 1467.325604] ? find_held_lock+0x36/0x1c0 [ 1467.329673] ? __lock_is_held+0xb5/0x140 [ 1467.333747] ? put_dec+0x3b/0xf0 [ 1467.337104] ? perf_trace_sched_process_exec+0x860/0x860 [ 1467.342545] ? graph_lock+0x270/0x270 [ 1467.346345] __should_failslab+0x124/0x180 [ 1467.350582] should_failslab+0x9/0x14 [ 1467.354391] kmem_cache_alloc_node+0x26e/0x730 [ 1467.358996] ? find_held_lock+0x36/0x1c0 [ 1467.363092] __alloc_skb+0x114/0x770 [ 1467.366816] ? netdev_alloc_frag+0x1f0/0x1f0 [ 1467.371267] ? kasan_check_read+0x11/0x20 [ 1467.375424] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1467.380700] ? rcu_read_unlock_special+0x370/0x370 [ 1467.385643] ? netlink_has_listeners+0x2cb/0x4a0 [ 1467.390398] ? netlink_tap_init_net+0x3d0/0x3d0 [ 1467.395078] alloc_uevent_skb+0x84/0x1da [ 1467.399149] kobject_uevent_env+0xa52/0x101e [ 1467.403558] kobject_uevent+0x1f/0x24 [ 1467.407354] lo_ioctl+0x16f1/0x22a0 [ 1467.410993] ? lo_rw_aio+0x1ef0/0x1ef0 [ 1467.414877] ? find_held_lock+0x36/0x1c0 [ 1467.418930] ? lo_rw_aio+0x1ef0/0x1ef0 [ 1467.422836] blkdev_ioctl+0x98e/0x21b0 [ 1467.426737] ? blkpg_ioctl+0xc10/0xc10 [ 1467.430646] ? lock_downgrade+0x900/0x900 [ 1467.434782] ? check_preemption_disabled+0x48/0x280 [ 1467.439802] ? kasan_check_read+0x11/0x20 [ 1467.443944] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1467.449237] ? rcu_read_unlock_special+0x370/0x370 [ 1467.454173] ? __fget+0x4d1/0x740 [ 1467.457636] ? ksys_dup3+0x680/0x680 [ 1467.461350] block_ioctl+0xee/0x130 [ 1467.464970] ? blkdev_fallocate+0x400/0x400 [ 1467.469288] do_vfs_ioctl+0x1de/0x1790 [ 1467.473183] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1467.478752] ? ioctl_preallocate+0x300/0x300 [ 1467.483216] ? __fget_light+0x2e9/0x430 [ 1467.487234] ? fget_raw+0x20/0x20 [ 1467.490703] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1467.495732] ? kmem_cache_free+0x24f/0x290 [ 1467.499974] ? putname+0xf7/0x130 [ 1467.503420] ? do_syscall_64+0x9a/0x820 [ 1467.507383] ? do_syscall_64+0x9a/0x820 [ 1467.511351] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1467.515925] ? security_file_ioctl+0x94/0xc0 [ 1467.520348] ksys_ioctl+0xa9/0xd0 [ 1467.523796] __x64_sys_ioctl+0x73/0xb0 [ 1467.527692] do_syscall_64+0x1b9/0x820 [ 1467.531574] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1467.536932] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1467.541865] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1467.546718] ? trace_hardirqs_on_caller+0x310/0x310 [ 1467.551738] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1467.556758] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1467.561829] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1467.566673] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1467.571865] RIP: 0033:0x4573d7 [ 1467.575054] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:59:32 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000fdfdffff00"}) 22:59:32 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) [ 1467.593966] RSP: 002b:00007f2a4600ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1467.601722] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004573d7 [ 1467.609009] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1467.616291] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1467.623565] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1467.630824] R13: 0000000000000000 R14: 00000000004d8ef0 R15: 0000000000000003 22:59:32 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:59:32 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000fffffdfd00"}) 22:59:32 executing program 0 (fault-call:0 fault-nth:23): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00001c00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:32 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) [ 1467.918594] FAULT_INJECTION: forcing a failure. [ 1467.918594] name failslab, interval 1, probability 0, space 0, times 0 [ 1467.930622] CPU: 1 PID: 22262 Comm: syz-executor0 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 1467.939237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1467.948608] Call Trace: [ 1467.948760] dump_stack+0x244/0x39d [ 1467.948795] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1467.948817] ? debug_smp_processor_id+0x1c/0x20 [ 1467.948838] ? perf_trace_lock+0x14d/0x7a0 [ 1467.948868] should_fail.cold.4+0xa/0x17 [ 1467.973253] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1467.978391] ? rcu_softirq_qs+0x20/0x20 [ 1467.982373] ? unwind_dump+0x190/0x190 [ 1467.986279] ? is_bpf_text_address+0xd3/0x170 [ 1467.990795] ? graph_lock+0x270/0x270 [ 1467.994599] ? find_held_lock+0x36/0x1c0 [ 1467.998667] ? __lock_is_held+0xb5/0x140 [ 1468.002763] ? kobject_uevent+0x1f/0x24 [ 1468.006744] ? perf_trace_sched_process_exec+0x860/0x860 [ 1468.012207] ? do_vfs_ioctl+0x1de/0x1790 [ 1468.016757] ? ksys_ioctl+0xa9/0xd0 [ 1468.020377] ? do_syscall_64+0x1b9/0x820 [ 1468.024463] __should_failslab+0x124/0x180 [ 1468.028708] should_failslab+0x9/0x14 [ 1468.032519] kmem_cache_alloc+0x2be/0x730 [ 1468.036699] skb_clone+0x1bb/0x500 [ 1468.040274] ? skb_split+0x11e0/0x11e0 [ 1468.044173] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1468.049306] ? netlink_trim+0x1b4/0x380 [ 1468.053316] ? netlink_skb_destructor+0x210/0x210 [ 1468.058179] netlink_broadcast_filtered+0x110f/0x1680 [ 1468.063390] ? __netlink_sendskb+0xd0/0xd0 [ 1468.067637] ? kasan_check_read+0x11/0x20 [ 1468.071785] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1468.077076] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1468.082641] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 1468.088110] ? refcount_dec_checked+0x70/0x70 [ 1468.092606] ? netlink_has_listeners+0x2cb/0x4a0 [ 1468.097379] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1468.102410] netlink_broadcast+0x3a/0x50 [ 1468.106495] kobject_uevent_env+0xa83/0x101e [ 1468.110918] kobject_uevent+0x1f/0x24 [ 1468.114722] lo_ioctl+0x16f1/0x22a0 [ 1468.118355] ? lo_rw_aio+0x1ef0/0x1ef0 [ 1468.122254] ? find_held_lock+0x36/0x1c0 [ 1468.126329] ? lo_rw_aio+0x1ef0/0x1ef0 [ 1468.130218] blkdev_ioctl+0x98e/0x21b0 [ 1468.134122] ? blkpg_ioctl+0xc10/0xc10 [ 1468.138020] ? lock_downgrade+0x900/0x900 [ 1468.142178] ? check_preemption_disabled+0x48/0x280 [ 1468.147250] ? kasan_check_read+0x11/0x20 [ 1468.151424] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1468.156717] ? rcu_read_unlock_special+0x370/0x370 [ 1468.161647] ? __fget+0x4d1/0x740 [ 1468.165113] ? ksys_dup3+0x680/0x680 [ 1468.168844] block_ioctl+0xee/0x130 [ 1468.172462] ? blkdev_fallocate+0x400/0x400 [ 1468.176777] do_vfs_ioctl+0x1de/0x1790 [ 1468.180670] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1468.186235] ? ioctl_preallocate+0x300/0x300 [ 1468.190651] ? __fget_light+0x2e9/0x430 [ 1468.194654] ? fget_raw+0x20/0x20 [ 1468.198157] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1468.203173] ? kmem_cache_free+0x24f/0x290 [ 1468.207402] ? putname+0xf7/0x130 [ 1468.210870] ? do_syscall_64+0x9a/0x820 [ 1468.214876] ? do_syscall_64+0x9a/0x820 [ 1468.218865] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1468.223446] ? security_file_ioctl+0x94/0xc0 [ 1468.227850] ksys_ioctl+0xa9/0xd0 [ 1468.231302] __x64_sys_ioctl+0x73/0xb0 [ 1468.235182] do_syscall_64+0x1b9/0x820 [ 1468.239081] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1468.244448] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1468.249376] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1468.254243] ? trace_hardirqs_on_caller+0x310/0x310 [ 1468.259282] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1468.264311] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1468.269353] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1468.274229] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1468.279427] RIP: 0033:0x4573d7 [ 1468.282644] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1468.301547] RSP: 002b:00007f2a4600ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1468.309276] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004573d7 [ 1468.316553] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1468.323816] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1468.331095] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1468.338393] R13: 0000000000000000 R14: 00000000004d8ef0 R15: 0000000000000003 22:59:33 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) shutdown(r1, 0x0) pipe(&(0x7f0000000400)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:33 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000fdfdffff00"}) 22:59:33 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:59:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000fcfdffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:33 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000fffffdfd00"}) 22:59:33 executing program 0 (fault-call:0 fault-nth:24): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:33 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:59:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000300000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:33 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000fffffdfd00"}) 22:59:33 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r2, 0x810c5701, &(0x7f0000000340)) [ 1468.646641] FAULT_INJECTION: forcing a failure. [ 1468.646641] name failslab, interval 1, probability 0, space 0, times 0 [ 1468.691058] CPU: 1 PID: 22296 Comm: syz-executor0 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 1468.699743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1468.709134] Call Trace: [ 1468.711756] dump_stack+0x244/0x39d [ 1468.715378] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1468.720586] ? debug_smp_processor_id+0x1c/0x20 [ 1468.725282] ? perf_trace_lock+0x14d/0x7a0 [ 1468.729554] should_fail.cold.4+0xa/0x17 [ 1468.733658] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1468.738775] ? debug_smp_processor_id+0x1c/0x20 [ 1468.743461] ? perf_trace_lock+0x14d/0x7a0 [ 1468.747758] ? lock_is_held_type+0x210/0x210 [ 1468.752185] ? graph_lock+0x270/0x270 [ 1468.756017] ? path_parentat.isra.41+0x20/0x160 [ 1468.760727] ? find_held_lock+0x36/0x1c0 [ 1468.764816] ? __lock_is_held+0xb5/0x140 [ 1468.768910] ? perf_trace_sched_process_exec+0x860/0x860 [ 1468.774414] __should_failslab+0x124/0x180 [ 1468.778668] should_failslab+0x9/0x14 [ 1468.782502] kmem_cache_alloc+0x2be/0x730 [ 1468.786664] ? rcu_read_unlock_special+0x370/0x370 [ 1468.791640] __d_alloc+0xc8/0xb90 [ 1468.795115] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 1468.800159] ? d_alloc_parallel+0x1f40/0x1f40 [ 1468.804714] ? d_lookup+0x255/0x300 [ 1468.808377] ? d_lookup+0x255/0x300 [ 1468.812064] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1468.816712] ? lookup_dcache+0x22/0x140 [ 1468.820728] ? trace_hardirqs_off_caller+0x300/0x300 [ 1468.825905] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1468.830941] d_alloc+0x96/0x380 [ 1468.834235] ? __d_lookup+0x9e0/0x9e0 [ 1468.838052] ? __d_alloc+0xb90/0xb90 [ 1468.841796] __lookup_hash+0xd9/0x190 [ 1468.845620] filename_create+0x1e5/0x5b0 [ 1468.849720] ? kern_path_mountpoint+0x40/0x40 [ 1468.854278] ? fget_raw+0x20/0x20 [ 1468.857782] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1468.863333] ? getname_flags+0x26e/0x590 [ 1468.867425] do_mkdirat+0xda/0x310 [ 1468.870984] ? __ia32_sys_mknod+0xb0/0xb0 [ 1468.875150] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1468.880546] ? trace_hardirqs_off_caller+0x300/0x300 [ 1468.885664] ? ksys_ioctl+0x81/0xd0 [ 1468.889321] __x64_sys_mkdir+0x5c/0x80 [ 1468.893249] do_syscall_64+0x1b9/0x820 [ 1468.897157] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1468.902543] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1468.907492] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1468.912353] ? trace_hardirqs_on_caller+0x310/0x310 [ 1468.917393] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1468.922429] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1468.927466] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1468.932342] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1468.937543] RIP: 0033:0x456987 [ 1468.940773] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1468.959705] RSP: 002b:00007f2a4600ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1468.967494] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 0000000000456987 [ 1468.974795] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1468.982079] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 22:59:33 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) [ 1468.989373] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1468.996693] R13: 0000000000000000 R14: 00000000004d8ef0 R15: 0000000000000003 22:59:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000ffffffffffff0700004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:33 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000fffffdfd00"}) 22:59:33 executing program 0 (fault-call:0 fault-nth:25): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000f5ffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:33 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) [ 1469.205431] FAULT_INJECTION: forcing a failure. [ 1469.205431] name failslab, interval 1, probability 0, space 0, times 0 [ 1469.242843] CPU: 1 PID: 22318 Comm: syz-executor0 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 1469.251488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1469.260877] Call Trace: [ 1469.263522] dump_stack+0x244/0x39d [ 1469.267219] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1469.272456] should_fail.cold.4+0xa/0x17 [ 1469.276546] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1469.281724] ? add_to_page_cache_lru+0xdb0/0xdb0 [ 1469.286620] ? mark_held_locks+0x130/0x130 [ 1469.290883] ? graph_lock+0x270/0x270 [ 1469.294706] ? print_usage_bug+0xc0/0xc0 [ 1469.298783] ? __lock_acquire+0x62f/0x4c20 [ 1469.303034] ? lock_unpin_lock+0x4a0/0x4a0 [ 1469.307327] ? __lock_is_held+0xb5/0x140 [ 1469.311447] ? udf_get_pblock_spar15+0x90/0x4a0 [ 1469.316166] ? lock_downgrade+0x900/0x900 [ 1469.320350] ? __find_get_block+0xba3/0xf10 [ 1469.324703] ? perf_trace_sched_process_exec+0x860/0x860 [ 1469.330180] ? kasan_check_write+0x14/0x20 [ 1469.334435] ? __brelse+0x104/0x180 [ 1469.338097] __should_failslab+0x124/0x180 [ 1469.342353] should_failslab+0x9/0x14 [ 1469.346242] kmem_cache_alloc+0x2be/0x730 [ 1469.350405] ? __find_get_block+0x3b9/0xf10 [ 1469.354836] ? ratelimit_state_init+0xb0/0xb0 [ 1469.359403] ext4_alloc_inode+0xc7/0x880 [ 1469.363482] ? ratelimit_state_init+0xb0/0xb0 [ 1469.368010] ? __lock_acquire+0x62f/0x4c20 [ 1469.372291] ? mark_held_locks+0x130/0x130 [ 1469.376552] ? graph_lock+0x270/0x270 [ 1469.380499] ? ext4_es_lookup_extent+0x48f/0xdd0 [ 1469.385290] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1469.390854] ? ratelimit_state_init+0xb0/0xb0 [ 1469.395375] alloc_inode+0x63/0x190 [ 1469.399054] new_inode_pseudo+0x71/0x1a0 [ 1469.403142] ? prune_icache_sb+0x1c0/0x1c0 [ 1469.407402] new_inode+0x1c/0x40 [ 1469.410795] __ext4_new_inode+0x4c8/0x65a0 [ 1469.415086] ? ext4_free_inode+0x1a10/0x1a10 [ 1469.419521] ? find_held_lock+0x36/0x1c0 [ 1469.423612] ? is_bpf_text_address+0xac/0x170 [ 1469.428139] ? lock_downgrade+0x900/0x900 [ 1469.432298] ? check_preemption_disabled+0x48/0x280 [ 1469.437343] ? kasan_check_read+0x11/0x20 [ 1469.441526] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1469.446878] ? rcu_read_unlock_special+0x370/0x370 [ 1469.451845] ? rcu_softirq_qs+0x20/0x20 [ 1469.455835] ? unwind_dump+0x190/0x190 [ 1469.459761] ? is_bpf_text_address+0xd3/0x170 [ 1469.464276] ? kernel_text_address+0x79/0xf0 [ 1469.468713] ? __kernel_text_address+0xd/0x40 [ 1469.473234] ? unwind_get_return_address+0x61/0xa0 [ 1469.478218] ? __save_stack_trace+0x8d/0xf0 [ 1469.482587] ? save_stack+0xa9/0xd0 [ 1469.486232] ? save_stack+0x43/0xd0 [ 1469.489876] ? __kasan_slab_free+0x102/0x150 [ 1469.494296] ? kasan_slab_free+0xe/0x10 [ 1469.498295] ? kmem_cache_free+0x83/0x290 [ 1469.502485] ? print_usage_bug+0xc0/0xc0 [ 1469.506578] ? __x64_sys_mkdir+0x5c/0x80 [ 1469.510660] ? do_syscall_64+0x1b9/0x820 [ 1469.514763] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1469.520164] ? trace_hardirqs_off+0xb8/0x310 [ 1469.524603] ? kasan_check_read+0x11/0x20 [ 1469.528767] ? do_raw_spin_unlock+0xa7/0x330 [ 1469.533202] ? trace_hardirqs_on+0x310/0x310 [ 1469.537637] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1469.543275] ? __dquot_initialize+0x629/0xdd0 [ 1469.547815] ? dquot_get_next_dqblk+0x180/0x180 [ 1469.552515] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 1469.557469] ? common_perm+0x1f6/0x7b0 [ 1469.561469] ext4_mkdir+0x2e1/0xe60 [ 1469.565143] ? ext4_init_dot_dotdot+0x510/0x510 [ 1469.569861] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1469.575416] ? security_inode_permission+0xd2/0x100 [ 1469.580489] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1469.586060] ? security_inode_mkdir+0xe8/0x120 [ 1469.590672] vfs_mkdir+0x42e/0x6b0 [ 1469.594264] do_mkdirat+0x27a/0x310 [ 1469.597908] ? __ia32_sys_mknod+0xb0/0xb0 [ 1469.602113] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1469.607500] ? trace_hardirqs_off_caller+0x300/0x300 [ 1469.612630] ? ksys_ioctl+0x81/0xd0 [ 1469.616281] __x64_sys_mkdir+0x5c/0x80 [ 1469.620210] do_syscall_64+0x1b9/0x820 [ 1469.624125] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1469.629507] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1469.634452] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1469.639315] ? trace_hardirqs_on_caller+0x310/0x310 [ 1469.644350] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1469.649389] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1469.654430] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1469.659301] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1469.664508] RIP: 0033:0x456987 [ 1469.667790] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1469.686735] RSP: 002b:00007f2a4600ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1469.694466] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 0000000000456987 22:59:34 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:59:34 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000fffffdfd00"}) [ 1469.701759] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1469.709045] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1469.716329] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1469.723613] R13: 0000000000000000 R14: 00000000004d8ef0 R15: 0000000000000003 22:59:34 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000fdfdffff00"}) 22:59:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000001c5ee539c37d1f234d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:34 executing program 0 (fault-call:0 fault-nth:26): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) [ 1469.962636] FAULT_INJECTION: forcing a failure. [ 1469.962636] name failslab, interval 1, probability 0, space 0, times 0 [ 1469.996333] CPU: 0 PID: 22338 Comm: syz-executor0 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 1470.004985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1470.014840] Call Trace: [ 1470.017461] dump_stack+0x244/0x39d [ 1470.021114] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1470.026326] ? debug_smp_processor_id+0x1c/0x20 [ 1470.031040] ? perf_trace_lock+0x14d/0x7a0 [ 1470.035313] should_fail.cold.4+0xa/0x17 [ 1470.039395] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1470.044517] ? debug_smp_processor_id+0x1c/0x20 [ 1470.049211] ? perf_trace_lock+0x14d/0x7a0 [ 1470.053493] ? lock_is_held_type+0x210/0x210 [ 1470.057938] ? graph_lock+0x270/0x270 [ 1470.061778] ? path_parentat.isra.41+0x20/0x160 [ 1470.066473] ? find_held_lock+0x36/0x1c0 [ 1470.070581] ? __lock_is_held+0xb5/0x140 [ 1470.074702] ? perf_trace_sched_process_exec+0x860/0x860 [ 1470.080218] __should_failslab+0x124/0x180 [ 1470.084477] should_failslab+0x9/0x14 [ 1470.088310] kmem_cache_alloc+0x2be/0x730 [ 1470.093074] ? rcu_read_unlock_special+0x370/0x370 [ 1470.098046] __d_alloc+0xc8/0xb90 [ 1470.101523] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 1470.106563] ? d_alloc_parallel+0x1f40/0x1f40 [ 1470.111075] ? d_lookup+0x255/0x300 [ 1470.114726] ? d_lookup+0x255/0x300 [ 1470.118374] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1470.122984] ? lookup_dcache+0x22/0x140 [ 1470.126977] ? trace_hardirqs_off_caller+0x300/0x300 [ 1470.132110] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1470.137149] d_alloc+0x96/0x380 [ 1470.140444] ? __d_lookup+0x9e0/0x9e0 [ 1470.144262] ? __d_alloc+0xb90/0xb90 [ 1470.148024] __lookup_hash+0xd9/0x190 [ 1470.151845] filename_create+0x1e5/0x5b0 [ 1470.155920] ? kern_path_mountpoint+0x40/0x40 [ 1470.160456] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1470.166004] ? getname_flags+0x26e/0x590 [ 1470.170095] do_mkdirat+0xda/0x310 [ 1470.173665] ? __ia32_sys_mknod+0xb0/0xb0 [ 1470.177844] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1470.183244] ? trace_hardirqs_off_caller+0x300/0x300 [ 1470.188373] ? ksys_ioctl+0x81/0xd0 [ 1470.192018] __x64_sys_mkdir+0x5c/0x80 [ 1470.195930] do_syscall_64+0x1b9/0x820 [ 1470.199840] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1470.205229] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1470.210190] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1470.215093] ? trace_hardirqs_on_caller+0x310/0x310 [ 1470.220137] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1470.220154] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1470.220174] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1470.220200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1470.220214] RIP: 0033:0x456987 [ 1470.220231] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:59:35 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000240)={@my=0x0}) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000040)={0x3, 0x7}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0xffff, 0x341001) 22:59:35 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:59:35 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000fffffdfd00"}) 22:59:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000001000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000001000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) [ 1470.220245] RSP: 002b:00007f2a4600ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1470.220260] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 0000000000456987 [ 1470.220269] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1470.220283] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1470.262454] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1470.262465] R13: 0000000000000000 R14: 00000000004d8ef0 R15: 0000000000000003 22:59:35 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000fdfdffff00"}) 22:59:35 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:59:35 executing program 0 (fault-call:0 fault-nth:27): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:35 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:59:35 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000fffffdfd00"}) [ 1470.534646] FAULT_INJECTION: forcing a failure. [ 1470.534646] name failslab, interval 1, probability 0, space 0, times 0 [ 1470.546673] CPU: 0 PID: 22363 Comm: syz-executor0 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 1470.555308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1470.564716] Call Trace: [ 1470.567333] dump_stack+0x244/0x39d [ 1470.570981] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1470.576230] should_fail.cold.4+0xa/0x17 [ 1470.580325] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1470.585463] ? mark_held_locks+0x130/0x130 [ 1470.589762] ? find_held_lock+0x36/0x1c0 [ 1470.593851] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1470.599412] ? check_preemption_disabled+0x48/0x280 [ 1470.604455] ? debug_smp_processor_id+0x1c/0x20 [ 1470.609171] ? perf_trace_lock+0x14d/0x7a0 [ 1470.613439] ? lock_is_held_type+0x210/0x210 [ 1470.617862] ? rcu_softirq_qs+0x20/0x20 [ 1470.621844] ? unwind_dump+0x190/0x190 [ 1470.625751] ? graph_lock+0x270/0x270 [ 1470.629578] __should_failslab+0x124/0x180 [ 1470.633848] should_failslab+0x9/0x14 [ 1470.637709] kmem_cache_alloc+0x47/0x730 [ 1470.641794] ? __es_tree_search.isra.12+0x1ba/0x220 [ 1470.646839] ? find_held_lock+0x36/0x1c0 [ 1470.650924] __es_insert_extent+0x30c/0x1120 [ 1470.655365] ? ext4_es_free_extent+0x790/0x790 [ 1470.659969] ? kasan_check_write+0x14/0x20 [ 1470.664236] ? do_raw_write_lock+0x14f/0x310 [ 1470.668715] ? do_raw_read_unlock+0x70/0x70 [ 1470.673050] ? __lock_is_held+0xb5/0x140 [ 1470.677212] ext4_es_insert_extent+0x352/0xbd0 [ 1470.681826] ? ext4_es_scan_clu+0x50/0x50 [ 1470.686005] ? __lock_is_held+0xb5/0x140 [ 1470.690100] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1470.695178] ext4_ext_put_gap_in_cache+0x15f/0x1f0 [ 1470.700136] ? ext4_rereserve_cluster+0x240/0x240 [ 1470.705014] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1470.710588] ext4_ext_map_blocks+0x1d92/0x48e0 [ 1470.715193] ? kasan_check_write+0x14/0x20 [ 1470.719476] ? ext4_ext_release+0x10/0x10 [ 1470.723648] ? graph_lock+0x270/0x270 [ 1470.727487] ? graph_lock+0x270/0x270 22:59:35 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:59:35 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000fdfdffff00"}) [ 1470.731307] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1470.736881] ? check_preemption_disabled+0x48/0x280 [ 1470.741936] ? lock_acquire+0x1ed/0x520 [ 1470.745926] ? ext4_map_blocks+0x487/0x1b50 [ 1470.750287] ? lock_release+0xa10/0xa10 [ 1470.754282] ? perf_trace_sched_process_exec+0x860/0x860 [ 1470.759759] ? ext4_es_cache_extent+0x6a0/0x6a0 [ 1470.764449] ? kasan_check_read+0x11/0x20 [ 1470.768650] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1470.773981] ? down_read+0x8d/0x120 [ 1470.777646] ? ext4_map_blocks+0x487/0x1b50 [ 1470.781991] ? __down_interruptible+0x700/0x700 [ 1470.786699] ? kernel_text_address+0x79/0xf0 [ 1470.791132] ext4_map_blocks+0xe2d/0x1b50 [ 1470.795306] ? __save_stack_trace+0x8d/0xf0 [ 1470.799660] ? ext4_issue_zeroout+0x190/0x190 [ 1470.804190] ? save_stack+0x43/0xd0 [ 1470.807847] ? __kasan_slab_free+0x102/0x150 [ 1470.812268] ? kasan_slab_free+0xe/0x10 [ 1470.816297] ? kmem_cache_free+0x83/0x290 [ 1470.820470] ext4_getblk+0x10e/0x630 [ 1470.824225] ? ext4_iomap_begin+0x1390/0x1390 [ 1470.828756] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1470.834327] ? __dquot_initialize+0x629/0xdd0 [ 1470.838852] ext4_bread+0x95/0x2b0 [ 1470.842432] ? ext4_getblk+0x630/0x630 [ 1470.846361] ? dquot_get_next_dqblk+0x180/0x180 [ 1470.851051] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 1470.855999] ? common_perm+0x1f6/0x7b0 [ 1470.859915] ext4_append+0x14e/0x370 [ 1470.863663] ext4_mkdir+0x532/0xe60 [ 1470.867337] ? ext4_init_dot_dotdot+0x510/0x510 [ 1470.872036] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1470.877603] ? security_inode_permission+0xd2/0x100 [ 1470.882646] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1470.888223] ? security_inode_mkdir+0xe8/0x120 [ 1470.892838] vfs_mkdir+0x42e/0x6b0 [ 1470.896415] do_mkdirat+0x27a/0x310 [ 1470.900084] ? __ia32_sys_mknod+0xb0/0xb0 [ 1470.904257] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1470.909649] ? trace_hardirqs_off_caller+0x300/0x300 [ 1470.914814] ? ksys_ioctl+0x81/0xd0 [ 1470.918491] __x64_sys_mkdir+0x5c/0x80 [ 1470.922528] do_syscall_64+0x1b9/0x820 [ 1470.926452] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1470.931837] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1470.936837] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1470.941739] ? trace_hardirqs_on_caller+0x310/0x310 [ 1470.946801] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1470.951859] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1470.956914] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1470.961794] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1470.966997] RIP: 0033:0x456987 [ 1470.970229] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1470.989155] RSP: 002b:00007f2a4600ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1470.996923] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 0000000000456987 [ 1471.004222] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1471.011512] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1471.019313] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1471.026608] R13: 0000000000000000 R14: 00000000004d8ef0 R15: 0000000000000003 22:59:36 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x7, 0x8000) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) openat$vnet(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vhost-vsock\x00', 0x2, 0x0) r3 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x1f, 0x501080) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e23, 0x0, @mcast1, 0x5fcd}}, 0x0, 0x0, 0x775b, 0xda10, 0x9}, &(0x7f0000000240)=0x98) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000280)={0x80, 0x6, 0x8, 0x401, 0x800, 0x1, 0x10001, 0x3, r4}, 0x20) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000e0ffffffffffffff4d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:36 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000fffffdfd00"}) 22:59:36 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:59:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000005004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:36 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:59:36 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000fffffdfd00"}) 22:59:36 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000fffffdfd00"}) 22:59:36 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:59:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000100100000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='%trfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x3, &(0x7f0000000580)={0x8, &(0x7f0000000540)=[{0xfb4, 0xffffffff, 0x2, 0x9}, {0x4, 0x7, 0x1, 0x6}, {0x3, 0x1c7da945, 0x0, 0xfffffffffffffffd}, {0x8, 0x9, 0x3, 0x2}, {0x2, 0x9, 0x8, 0x6}, {0x100000001, 0x7, 0xfffffffffffffffa, 0x8001}, {0x8, 0xd2, 0x20, 0x1}, {0xe43, 0x2, 0x3, 0x8}]}) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000380)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = semget$private(0x0, 0x4, 0x42) semctl$IPC_RMID(r1, 0x0, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x1, 0x5, 0x5, 0xffff, 0xffffffffffffff81}, &(0x7f0000000280)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000440)={r4, @in6={{0xa, 0x4e24, 0x10000, @mcast2, 0x3ff}}, 0x80000001, 0x2000}, 0x90) setsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000340)={r4}, 0x8) shutdown(r2, 0x0) getsockname$inet6(r3, &(0x7f00000003c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000400)=0x1c) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:37 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000fdfdffff00"}) 22:59:37 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:59:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000000000001c004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000684d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='b%rfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:37 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:59:37 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000fffffdfd00"}) 22:59:37 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000fdfdffff00"}) 22:59:37 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:59:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000010000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:37 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000fffffdfd00"}) 22:59:38 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r2, 0x0) pipe(&(0x7f0000000180)) fcntl$setstatus(r1, 0x4, 0x400) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btr.s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:38 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:59:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000007ffffffffffff004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:38 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000fffffdfd00"}) 22:59:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000001020000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:38 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:59:38 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000fdfdffff00"}) 22:59:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000040000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:38 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:59:38 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000fffffdfd00"}) 22:59:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btr/s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:39 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(0xffffffffffffffff, &(0x7f0000000100)={0x28, 0x0, 0xffffffffffffffff}, 0x3) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:39 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:59:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000008000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:39 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000fffffdfd00"}) 22:59:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000f9fdffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrf+\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:39 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000fdfdffff00"}) 22:59:39 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:59:39 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000fffffdfd00"}) 22:59:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfx\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:39 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r3, 0xc0305710, &(0x7f0000000040)={0x0, 0xffffffff, 0x5, 0xfe05}) ioctl$UFFDIO_ZEROPAGE(r2, 0xc020aa04, &(0x7f0000000000)={{&(0x7f0000ffc000/0x2000)=nil, 0x2000}, 0x1}) 22:59:39 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:59:39 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000fffffdfd00"}) 22:59:39 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:59:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000097ffffff000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:39 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000fdfdffff00"}) 22:59:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000200000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:39 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000fffffdfd00"}) 22:59:39 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:59:39 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000fffffdfd00"}) 22:59:39 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:59:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfd\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:40 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@hyper}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:40 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:59:40 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000fdfdffff00"}) 22:59:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000ffffff8c4d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000700000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfl\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:40 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000fffffdfd00"}) 22:59:40 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:59:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000094d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:40 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) write$binfmt_script(r1, &(0x7f0000000400)={'#! ', './file0', [{0x20, 'fou\x00'}, {0x20, 'fou\x00'}, {0x20, '[mime_type'}, {0x20, ']'}], 0xa, "ca8d7779cb8a9deb901c8d796345a541a26774b85b3a3d5b4c53472ca2cd698e29c866807e32a4db511475040efeb549584ac3248f5c9ba852d9aea6f58d5b376a75055e4d0357fb6a0028f2d9fad9f02526643beeebb5579dfaf333ca676a4eb30f2b1be88c108df84c39c708821c095e20f94c5be278f4167d0e194a6ef55dd9f06e68a71848d30b3c65ce33a27249a8d72936b671753fad616deb"}, 0xbe) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r2, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x8000, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') ioctl$VHOST_NET_SET_BACKEND(r3, 0x4008af30, &(0x7f0000000200)={0x0, r3}) sendmsg$FOU_CMD_DEL(r3, &(0x7f00000003c0)={&(0x7f0000000240), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x38, r4, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}]}, 0x38}}, 0x8000) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x8905, &(0x7f00000000c0)) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_IRQP_SET(r5, 0x4008700c, 0x1b40) 22:59:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000001020004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:40 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:59:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfu\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:40 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000fffffdfd00"}) 22:59:41 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:59:41 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000fdfdffff00"}) 22:59:41 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000fffffdfd00"}) 22:59:41 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:59:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000004000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000009004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:41 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000fffffdfd00"}) 22:59:41 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfc\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:41 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:59:41 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000fffffdfd00"}) 22:59:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000fffffff5000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000fffffdfd004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:41 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:59:41 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000fffffdfd00"}) 22:59:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000102000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:42 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:59:42 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000fdfdffff00"}) 22:59:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfp\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:42 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000ffffffe0000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:42 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000fdfdffff00"}) 22:59:42 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:59:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000400000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrf*\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:42 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:59:42 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000fffffdfd00"}) 22:59:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000000000003f004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:43 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:59:43 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000fffffdfd00"}) 22:59:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000e0ff0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:43 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_bt(r1, 0x0, &(0x7f0000000240)="adca265f768d516c5117499bb71d1df4785ce732f6e71303ada741305641fff8d499f400615844333418d475e49c723fb41161c1c9b116afd9aa028e5425f71b2792f4471fc40e47766e5a71c8c6802b75ab72e47c46cd8a895f9b47") r3 = syz_open_dev$mice(&(0x7f00000004c0)='/dev/input/mice\x00', 0x0, 0x20000) connect$vsock_dgram(r3, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0xfffffffffffffd16) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x4, 0x0) shutdown(r2, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:43 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000fffffdfd00"}) 22:59:43 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:59:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrf%\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000004000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000ffffffffffffff7f4d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:43 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:59:43 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000fdfdffff00"}) 22:59:44 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:44 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:59:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000100000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000ffffffff4d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:44 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) write$P9_RREADLINK(r2, &(0x7f0000000040)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) 22:59:44 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000fdfdffff00"}) 22:59:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfi\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:44 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:59:44 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:44 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:59:44 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000fffffdfd00"}) 22:59:44 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:59:44 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000fdfdffff00"}) 22:59:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrf#\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000fffffdfd00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:44 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:59:45 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) unlinkat(r1, &(0x7f0000000240)='./file0\x00', 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r2, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000060000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:45 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:45 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:59:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfo\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000007000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:45 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000fffffdfd00"}) 22:59:45 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:59:45 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000fffffdfd00"}) 22:59:45 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:59:45 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000fdfdffff00"}) 22:59:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000003000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:46 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x30, 0xfa00, {&(0x7f0000000280)={0xffffffffffffffff}, 0x0, {0xa, 0x4e22, 0x51a, @ipv4={[], [], @multicast1}, 0x7}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000380)={0x11, 0x10, 0xfa00, {&(0x7f0000000240), r3}}, 0x18) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$HDIO_GETGEO(r4, 0x301, &(0x7f00000004c0)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000480)={r2, &(0x7f00000003c0)="b8c5a3af9010b8ac278cb2e2c3b339b41d2174a59fc2671728f5f7484cce4ca7b0d940208405428838a6f2999747044fb342f545c6b7291dd7ae4b612b42a8f8dcaa369ec418bc7f4681d9599aab93efa3d8", &(0x7f0000000440)=""/23}, 0x18) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:46 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:59:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrf-\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000900000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:46 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000400000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:46 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:59:46 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000054d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:46 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:46 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:59:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrf.\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:47 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x0, 0x2000) write$UHID_INPUT(r1, &(0x7f0000000340)={0x8, "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", 0x1000}, 0x1006) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x509000, 0x0) ioctl$UFFDIO_UNREGISTER(r3, 0x8010aa01, &(0x7f0000000240)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}) connect$vsock_dgram(r2, &(0x7f0000000100)={0x28, 0x0, 0x4, @my=0x0}, 0x10) shutdown(r2, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:47 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000000000fdfdffff00"}) 22:59:47 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:59:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000f4ffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000fffffdf94d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrf0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:47 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000000000fdfdffff00"}) 22:59:47 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:59:47 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:47 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:59:47 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfX\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:48 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) fchmod(r0, 0x1000000000) openat$vnet(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@hyper}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='trusted.overlay.nlink\x00', &(0x7f0000000900)={'L-', 0x401}, 0x28, 0x1) connect$vsock_dgram(r2, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) close(r0) shutdown(r2, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000840)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) ioctl$SCSI_IOCTL_SYNC(r3, 0x4) pipe(&(0x7f0000000180)={0xffffffffffffffff}) write$FUSE_GETXATTR(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffffe, 0x8, {0xba93}}, 0x18) write$FUSE_GETXATTR(r4, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x3}}, 0x18) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) clock_gettime(0x0, &(0x7f0000000940)={0x0, 0x0}) recvmmsg(r1, &(0x7f00000007c0)=[{{&(0x7f0000000a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000280)=""/4, 0xfffffffffffffc73}, {&(0x7f0000000400)=""/247, 0xf7}, {&(0x7f0000000500)=""/216, 0xd8}, {&(0x7f0000000600)=""/40, 0x28}, {&(0x7f0000000640)=""/16, 0x10}], 0x5, &(0x7f0000000700)=""/130, 0x82, 0x4}, 0x6}], 0x1, 0x2000, &(0x7f0000000800)={r5, r6+30000000}) 22:59:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000f6ffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:48 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:59:48 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000484d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:48 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000000000fdfdffff00"}) 22:59:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673f9", &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:48 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:48 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) [ 1483.650781] QAT: Invalid ioctl [ 1483.663069] QAT: Invalid ioctl 22:59:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000fffffff5004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:48 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:48 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000280)={@reserved}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000000)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x15}}, {0x306, @random="4358d90d7a2f"}, 0x2, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1f}}, 'veth1\x00'}) 22:59:48 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:59:48 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000000000000000fdfdffff00"}) 22:59:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:48 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000006000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:48 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:59:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000fffffdf900000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:48 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:48 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x10000, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000280), 0x4) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000240)={0x2, 0x101}, 0x2) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r2, 0x1) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:49 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:59:49 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000001f000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:49 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:59:49 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000000000000000fdfdffff00"}) 22:59:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000fffffdfc00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:49 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:59:49 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:49 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:49 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:59:49 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x81, 0x8040) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000240)=0xac4, 0x4) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000100), 0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e23, 0x7, @mcast2, 0xdd}}, 0x3, 0x8000, 0x500, 0x1000, 0x8}, &(0x7f0000000280)=0x98) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000400)={r3, 0x9}, 0x8) shutdown(r2, 0xfffffffffffffffe) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000011000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:49 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000000000000000fdfdffff00"}) 22:59:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:49 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:59:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000800000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:50 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:50 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:59:50 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000240)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r2, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:50 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:50 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:59:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000001f0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:50 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:50 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:59:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000fffffff6004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:50 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:59:50 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000fdfdffff000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:50 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:59:51 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@hyper}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r2 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x5000000000, 0xa0002) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000280)={0x5}, 0x4) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$void(r1, 0xc0045c79) shutdown(r1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) fcntl$addseals(r3, 0x409, 0x2) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000040)={0x7f, 0x1, @name="75253ecc93dc587a2b3b24a7010e9e2498144318261d359786218440defb5066"}) 22:59:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="62747266730e", &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:51 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000000000000000000000fdfdffff00"}) 22:59:51 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:59:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000006000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:51 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000010004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:51 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:59:51 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000000000000000000000fdfdffff00"}) 22:59:51 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:51 executing program 1: openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000040)={0x9, 0x7f, 0xff, 0xff, 0x6}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$RTC_AIE_OFF(r2, 0x7002) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000240)=0xc) capset(&(0x7f0000000280)={0x39980732, r3}, &(0x7f0000000340)={0x8, 0x8, 0xb0, 0x200, 0x2, 0x3}) 22:59:51 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000234d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:51 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:51 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:59:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000040000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:51 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:59:51 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = fcntl$getown(r0, 0x9) sched_setparam(r1, &(0x7f0000000240)=0x1000) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) open(&(0x7f0000000280)='./file0\x00', 0x0, 0xa2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000440)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000000480)=0x3) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r3 = dup(r0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast2}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000000040)=0xe8) shutdown(r2, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) epoll_create1(0x80000) 22:59:51 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:51 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000c0ed00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:51 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000000000000000000000fdfdffff00"}) 22:59:51 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:59:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000fbffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:51 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:52 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:59:52 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000400000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:52 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:52 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:59:52 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r2, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r3, 0x40086424, &(0x7f0000000280)={r4, 0x2}) pipe(&(0x7f0000000180)) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-vsock\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f0000000140)={0x1, 0x0, 0x0, 0x7fffffff}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0xfffffffffffffeb8}) 22:59:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000008004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:52 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:59:52 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:52 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000001c0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:52 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000000000000000000000000000fdfdffff00"}) 22:59:52 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:59:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000003004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:53 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:59:53 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000000000000000000000000000fdfdffff00"}) 22:59:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:53 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x40000, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000380)={0x0, 0x3}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000400)=@assoc_value={r4, 0x8}, 0x8) connect$vsock_dgram(r2, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r2, 0x0) ioctl$TIOCGSOFTCAR(r3, 0x5419, &(0x7f0000000440)) r5 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xc2, 0x100) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r5, 0x84, 0x16, &(0x7f0000000240)={0x2, [0x5, 0x6]}, 0x8) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000ffe00000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:53 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:59:53 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000fffffff600000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:53 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:53 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:59:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000001c00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:54 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000000000000000000000000000fdfdffff00"}) 22:59:54 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:59:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000ffffffffffff07004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:54 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:54 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:59:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00001020000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:54 executing program 1: socketpair$inet(0x2, 0x80800, 0x8, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYBLOB="e800000026a3741dc431f56e5ea41a042c39b1e8e1c000661fbf337dd0a7ace969690e2711a310d8d1a211279c8c6a4e26c7e8b62ff751d387391f95b8d8756e9f943b771d22935e2a4300a65bae22ed7b3fce03e1470d9cc89ef50a0a057038483309b3057a43c6c4d1354c12d4fda719cdcdb85637227ad6ce8bd65d8759294d4317cf03c850b47f7e07364ceb7a3c488a681e1260bd1e52b2ca8e29d009bf01abfd30c022bd5dcaaec4ef9577b799ed3d01a81b884603c9bf5bf8fd343db8fb9c05dc7cb6a42d7ff20b22e350038a01f85fa3810b4631976d355073906d98329d72a3cd6ad8879e5a3598"], &(0x7f0000000280)=0xf0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000440)={r2, @in6={{0xa, 0x4e21, 0x5, @local, 0x2000000}}, [0xc45, 0x200, 0x100000001, 0x1, 0x4, 0x3f, 0x40, 0xfffffffffffffe01, 0x178, 0xc9, 0xffffffffb3ee93ab, 0x3, 0x7a415aeb, 0x1]}, &(0x7f0000000540)=0x100) r3 = dup3(r1, r1, 0x80000) ioctl$BLKSECTGET(r3, 0x1267, &(0x7f0000000600)) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r3, 0x40405515, &(0x7f00000005c0)={0x9, 0x4, 0x0, 0x20, 'syz0\x00', 0x9}) r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r4, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r5 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r5, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r5, 0x0) pipe(&(0x7f0000000180)) ioctl$VHOST_VSOCK_SET_RUNNING(r4, 0x4004af61, &(0x7f0000000040)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000fffffe004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:54 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:55 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:59:55 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:59:55 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000000000000000000000000000000000fdfdffff00"}) 22:59:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000ffffff8c00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:55 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:59:55 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000004c000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:55 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:59:55 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xfff, 0x100) accept$unix(r1, 0x0, &(0x7f0000000240)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r2, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:55 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:55 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:59:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000010010000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000fffffe00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:56 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:59:56 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000000000000000000000000000000000fdfdffff00"}) 22:59:56 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:59:56 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000ffffffffffffffff004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:56 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:59:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000001000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:56 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfsu', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:56 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt(r0, 0x40000000000000ab, 0x1002, &(0x7f0000000340)="263cea1b071acf7f08364403c76990895c8a9abb11d04f61cc6aab5e31ae8ace4d5b0152c50c5d349ff5af70697f077f61626262a0a3f55437599f02b4aa6e040002aca349f0303834eb0fd8a511077c7b59f576f826fbf7fb08f2998fce290360f2322d07b8887c0baacb58b51e1e3866d90e060f80c6086cd39bdc70a04366c5d4cdf21d2a4f487697666cb26329", 0x8f) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000640)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r3, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000280)={0x0, 0x10000}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000440)={r4, @in={{0x2, 0x4e23, @multicast2}}, 0x8, 0x368, 0x1, 0x15, 0x243}, &(0x7f0000000500)=0x98) shutdown(r3, 0x0) r5 = getpgrp(0xffffffffffffffff) prlimit64(r5, 0xc, &(0x7f0000000040)={0x8}, &(0x7f0000000240)) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00008cffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:57 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000000000000000000000000000000000fdfdffff00"}) 22:59:57 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 22:59:57 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:57 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:59:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="627472667304", &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000040004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000231f7dc339e55e1c4d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:57 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:57 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:59:57 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000000000000000000000000000000000000000fdfdffff00"}) 22:59:57 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) set_tid_address(&(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_GET_UNIQUE(r3, 0xc0106401, &(0x7f0000000240)={0x1000, &(0x7f0000000340)=""/4096}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:57 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 22:59:57 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000fffffe00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000014d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:58 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 22:59:58 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000604d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:58 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 22:59:58 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000000000000000000000000000000000000000fdfdffff00"}) 22:59:59 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) socketpair(0x15, 0x80a, 0x3f, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 22:59:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000011000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:59 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 22:59:59 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:59 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000001004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 22:59:59 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 22:59:59 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 22:59:59 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000000000001f4d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 22:59:59 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 22:59:59 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000000000000000000000000000000000000000fdfdffff00"}) 22:59:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 23:00:00 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 23:00:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000fffffffb00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:00 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 23:00:00 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000040)='bond_slave_0\x00') connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 23:00:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000024d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673c0", &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 23:00:00 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 23:00:00 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 23:00:00 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 23:00:00 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000000000000000000000000000000000000000000000fdfdffff00"}) 23:00:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000001c000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673fc", &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 23:00:00 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 23:00:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000023000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:00 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 23:00:01 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x6, 0x280000) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 23:00:01 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 23:00:01 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 23:00:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000068000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 23:00:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000003f000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:01 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 23:00:01 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 23:00:01 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 23:00:01 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 23:00:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00001000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000f6ffffff000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 23:00:02 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 23:00:02 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000000000000000000000000000000000000000000000fdfdffff00"}) 23:00:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000500000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:02 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') connect$vsock_dgram(r2, &(0x7f0000000340)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) shutdown(r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) pipe(&(0x7f0000000180)={0xffffffffffffffff}) ioctl$BLKBSZSET(r3, 0x40081271, &(0x7f0000000040)=0x40) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 23:00:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000000000000a4d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:02 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 23:00:02 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 23:00:02 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 23:00:02 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x48000, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000240), &(0x7f0000000280)=0x4) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 23:00:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000003f00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:02 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 23:00:02 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 23:00:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 23:00:02 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000000000000000000000000000000000000000000000fdfdffff00"}) 23:00:02 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 23:00:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000009000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:02 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fdfdffff00"}) 23:00:02 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 23:00:02 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 23:00:03 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000040)={0x1, 0x0, 0x10001, 0x100}) connect$vsock_dgram(r2, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r2, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 23:00:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000001100000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 23:00:03 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 23:00:03 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 23:00:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000e75000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:03 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fdfdffff00"}) 23:00:03 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 23:00:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000074000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs ', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 23:00:03 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 23:00:03 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 23:00:04 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000400)={@my=0x0}) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000340), &(0x7f0000000280)=0x68) getegid() r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x800, 0x0) connect$vsock_dgram(r2, &(0x7f0000000240)={0x28, 0x0, 0x2711, @my=0x0}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000440)={{{@in=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f00000003c0)=0xe8) r5 = getuid() getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast1, @rand_addr}, &(0x7f0000000580)=0xc) getresuid(&(0x7f00000005c0)=0x0, &(0x7f0000000600), &(0x7f0000000640)) sendmsg$nl_xfrm(r2, &(0x7f0000000900)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x900000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="280200001000000025bd7000fcdbdf2500000000000000000000ffffe00000017f0000010000000000000000170000004e2200004e220003000020a0f7000000", @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="000000000000000000000000d200000000000004d63c000000ac1414aa000000000000000000000000fe770000000000000400000000000000470300007c7c9dbe1e260806a49af81200000000ffff000000000000ca000000000000000600000000000000fdffffffffffffff00000000000000000700000000000000ffffff7f0000000000000000010000000700000000000000faffffff05000000ff0100002bbd70000735000000000476880000000000000000000000ac1414bb000000030000000000000000000000000000000000000000000000000a00fe0108001d006c4100001c000400ffff4e244e220000ac1414bb000000000000000000000000e4000600e0000002000000000000000000000000e00000010000000000000000000000004e20ff", @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="ffffffff000000000000000000000000000004d6ff000000ff010000000000000000000000000001390400000000000006000000000000000400000000000000018000000000000003000000000000000000000000000000cb420000000000000300000000000000060000000000000007000000000000000754fe5900000000000400000000000004000000090000000600000025bd700007350000e8b800040c000000000000000800160000000080"], 0x228}, 0x1, 0x0, 0x0, 0x4048000}, 0x20000040) connect$vsock_dgram(r3, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r3, 0x0) pipe(&(0x7f00000009c0)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 23:00:04 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 23:00:04 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 23:00:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000300000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:04 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000fff000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 23:00:04 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 23:00:04 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 23:00:04 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fdfdffff00"}) 23:00:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000c0ed000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:04 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 23:00:04 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000003f000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:05 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f0000000040)={0x4e09, 0x7}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 23:00:05 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 23:00:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 23:00:05 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 23:00:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000ffffffffffff0700004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000060000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:05 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 23:00:05 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 23:00:05 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 23:00:05 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 23:00:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 23:00:05 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fdfdffff00"}) 23:00:06 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000001500)={@my=0x1}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x101000, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001380)={0xffffffffffffffff, 0x10, &(0x7f0000001340)={&(0x7f0000000340)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001400)={r1, 0x10, &(0x7f00000013c0)={&(0x7f0000000240)=""/94, 0x5e, r2}}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r3, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r3, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 23:00:06 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 23:00:06 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fdfdffff00"}) 23:00:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000480000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000600000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="627472667302", &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 23:00:06 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 23:00:06 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 23:00:06 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 23:00:06 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 23:00:06 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x20a, 0x0, &(0x7f0000000280)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 23:00:06 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fdfdffff00"}) 23:00:06 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 23:00:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000ffffff8c004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="627472667303", &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 23:00:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000006c000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:06 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 23:00:06 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 23:00:06 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 23:00:06 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 23:00:06 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 23:00:06 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fdfdffff00"}) 23:00:07 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000240)={@my=0x1}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) socket$inet_udplite(0x2, 0x2, 0x88) 23:00:07 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 23:00:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000002004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="627472667306", &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 23:00:07 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 23:00:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000a000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:07 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 23:00:07 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 23:00:07 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000280)={0x2, &(0x7f0000000240)=[{}, {0x0}]}) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, &(0x7f0000000340)={r1, 0x1}) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) shutdown(r2, 0x0) pipe(&(0x7f0000000380)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 23:00:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000080004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:07 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fdfdffff00"}) 23:00:07 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 23:00:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 23:00:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000004c0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:07 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd"}) 23:00:07 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 23:00:08 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 23:00:08 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 23:00:08 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fdfdffff00"}) 23:00:08 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 23:00:08 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffd"}) 23:00:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000fff004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 23:00:08 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 23:00:08 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000580)=[{r2, 0x8000}, {r2, 0x100}, {r4, 0x400}, {r3, 0x4012}, {r4, 0x100}], 0x5, 0x80000000) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e21, 0x0, @ipv4={[], [], @multicast1}, 0x3e}}}, &(0x7f0000000700)=0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r4, 0x84, 0x23, &(0x7f0000000740)={r5, 0x4}, 0x8) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x6, 0x100010, r1, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000000340)={0x0, @in6={{0xa, 0x1f, 0x4, @local, 0x6}}, [0x53, 0x400, 0x7, 0x8000000000000000, 0x7, 0xa885, 0x6ca, 0x8, 0x9, 0x10001, 0x4, 0x8, 0x5, 0x200, 0x9]}, &(0x7f0000000040)=0x100) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000240)={0xfffffffffffffff7, 0xd, 0x81, 0x8, r6}, &(0x7f0000000280)=0x10) setsockopt$inet_group_source_req(r4, 0x0, 0x2c, &(0x7f0000000440)={0x5, {{0x2, 0x4e21, @local}}, {{0x2, 0x4e23, @multicast1}}}, 0x108) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000600)=@generic={0x3, 0x0, 0x2}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 23:00:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000020100000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:08 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 23:00:08 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 23:00:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000fffffe0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:08 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 23:00:08 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 23:00:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 23:00:09 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000744d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:09 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fdfdffff00"}) 23:00:09 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 23:00:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000002000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:09 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 23:00:09 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff"}) 23:00:09 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 23:00:09 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000e750000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 23:00:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000fffffff500000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:09 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 23:00:09 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fdfdffff00"}) 23:00:09 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000048000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:09 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 23:00:09 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff"}) 23:00:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 23:00:10 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000040)=0x57, 0x4) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 23:00:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000007fffffff4d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:10 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 23:00:10 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd00"}) 23:00:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000c0ed0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 23:00:10 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fdfdffff"}) 23:00:10 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 23:00:11 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, 'port1\x00'}) 23:00:11 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 23:00:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 23:00:11 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffdfd"}) 23:00:11 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x1) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f0000000040)) 23:00:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000ffffff8c4d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:11 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 23:00:11 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fdfdff"}) 23:00:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000fffffdfc4d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 23:00:11 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, 'port1\x00'}) 23:00:11 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 23:00:12 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f7274310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffd"}) 23:00:12 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 23:00:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000fffffffb4d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 23:00:12 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) ioctl$int_in(r0, 0x0, &(0x7f0000000040)=0x1000) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 23:00:12 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 23:00:12 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fdfd"}) 23:00:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000fffffdfd000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 23:00:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000001000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:12 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 23:00:12 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, 'port1\x00'}) 23:00:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000fffffff4000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:13 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 23:00:13 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f727431000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff"}) 23:00:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000ffffff8c000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:13 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f0000000240)={{0x4, 0x0, 0x4b, 0xfff, 0x5, 0xffffffffffffffff}, 0x800}) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000280)) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r2, 0x0) pipe(&(0x7f0000000180)) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) r4 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r3, r4) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 23:00:13 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fd"}) 23:00:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 23:00:13 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 23:00:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000fff0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000001c0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:13 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf000000]}) 23:00:13 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, 'port1\x00'}) 23:00:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000edc0000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:14 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 23:00:14 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, "706f72743100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff"}) 23:00:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 23:00:14 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000000)='notify_on_release\x00', 0x2, 0x0) sendfile(r3, r3, &(0x7f00000000c0), 0x7ffff000) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000340)=0xb) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r4 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r4, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r4, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f00000003c0)={&(0x7f0000000480), 0xc, &(0x7f0000000280)={&(0x7f00000004c0)={0xa4, r5, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xa, 0x20}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x8}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xc}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffffffffff8}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x80000001}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xd3da}]}, 0xa4}}, 0x400c000) pipe(&(0x7f0000000180)={0xffffffffffffffff}) sendmsg$IPVS_CMD_SET_DEST(r6, &(0x7f00000005c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000800}, 0xc, &(0x7f0000000580)={&(0x7f0000000400)={0x68, r5, 0x28, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7ff}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7}]}]}, 0x68}}, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 23:00:14 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000200000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:14 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, 'port1\x00'}) 23:00:14 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 23:00:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000084d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 23:00:14 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf]}) 23:00:14 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, 'port1\x00'}) 23:00:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 23:00:15 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00000000000000]}) 23:00:15 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, 'port1\x00'}) 23:00:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000007a000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:15 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000040)={0xa6be, 0x982, 0x0, 0x0, 0x80000000000}) shutdown(r2, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 23:00:15 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, 'port1\x00', 0xfffffdfd}) 23:00:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000024d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:15 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, []}) 23:00:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 23:00:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000005000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:15 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, []}) 23:00:15 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, 'port1\x00', 0xfdfdffff00000000}) 23:00:16 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, 'port1\x00', 0xfdfdffff}) 23:00:16 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, []}) 23:00:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfst', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 23:00:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000034d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:16 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1f, 0x20000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000340)={0x1, 0x6, 0x4, 0x20000000, {0x77359400}, {0x5, 0x8, 0x7, 0x3, 0x1ff, 0x4, "0a015ed3"}, 0x1, 0x1, @planes=&(0x7f0000000280)={0x4f0, 0x5, @fd=r2, 0x7c1}, 0x4}) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r3, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r3, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 23:00:16 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, []}) 23:00:16 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0xfffffdfd}) 23:00:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000404d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000000000007a4d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 23:00:17 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, []}) 23:00:17 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0xfdfdffff00000000}) 23:00:17 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0xfdfdffff}) 23:00:17 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, []}) 23:00:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 23:00:17 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000001c000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:17 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) shutdown(r1, 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 23:00:17 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0xfffffdfd}) 23:00:17 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, []}) 23:00:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000f9fdffff000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 23:00:17 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000009000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000140)) 23:00:17 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8, 0x101000) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000180)={@loopback, 0x37, r2}) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f00000003c0)=""/91) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x80000001}, 'port1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f0000000100)={0x8000, 0x6, 0x45d, 0x5, 0x80000000, 0x8}) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x800000008010, r0, 0x0) 23:00:17 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0xfdfdffff00000000}) 23:00:18 executing program 5: syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'bridge_slave_0\x00'}, 0x18) r0 = syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x80080000002, 0x549080) bind$inet(0xffffffffffffffff, &(0x7f0000000700)={0x2, 0x0, @local}, 0xfffffffffffffe01) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='ip6_vti0\x00', 0x10) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000240)={{0x0, @remote, 0x0, 0x4, 'fo\x00', 0x23, 0x5}, {@dev, 0x0, 0x0, 0x2, 0x4, 0x20}}, 0x44) r1 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$void(r1, 0x5450) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r3 = socket$inet(0x10, 0x3, 0x0) sendmsg(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="230000002e0007041dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/dsp\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000580), &(0x7f0000000600)=0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000540)=[@mss, @mss], 0x2) mprotect(&(0x7f0000723000/0x1000)=nil, 0x1000, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r5, 0x0) mbind(&(0x7f0000db6000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000000), 0x0, 0x4) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f00000000c0), 0x4) r6 = gettid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000040)='gretap0\x00', 0x10) connect$inet6(r7, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x8961}, 0x1c) process_vm_writev(r6, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1000005a, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0xdb, 0x0) 23:00:18 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0305302, &(0x7f0000000200)={{}, 'port1\x00', 0x0, 0x0, 0xfdfdffff}) 23:00:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="627472667310", &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)) 23:00:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000007fffffffffffffff4d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb33", 0x8c, 0x10000}], 0x0, &(0x7f0000000140)) [ 1513.345114] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. [ 1513.448217] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. [ 1513.951537] ================================================================== [ 1513.959413] BUG: KASAN: use-after-free in vhost_work_queue+0xc3/0xe0 [ 1513.965936] Read of size 8 at addr ffff8801751adba8 by task syz-executor1/24144 [ 1513.973389] [ 1513.975044] CPU: 0 PID: 24144 Comm: syz-executor1 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 1513.983634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1513.993007] Call Trace: [ 1513.995622] dump_stack+0x244/0x39d [ 1513.999288] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1514.004496] ? printk+0xa7/0xcf [ 1514.007797] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 1514.012582] print_address_description.cold.7+0x9/0x1ff [ 1514.017982] kasan_report.cold.8+0x242/0x309 [ 1514.022413] ? vhost_work_queue+0xc3/0xe0 [ 1514.026586] __asan_report_load8_noabort+0x14/0x20 [ 1514.031539] vhost_work_queue+0xc3/0xe0 [ 1514.035538] vhost_transport_send_pkt+0x28a/0x380 [ 1514.040411] ? vhost_vsock_dev_open+0x5a0/0x5a0 [ 1514.045169] ? virtio_transport_send_pkt_info+0x2e7/0x460 [ 1514.050764] ? __local_bh_enable_ip+0x160/0x260 [ 1514.055467] virtio_transport_send_pkt_info+0x31d/0x460 [ 1514.060861] virtio_transport_shutdown+0x1b1/0x270 [ 1514.065810] ? virtio_transport_connect+0x220/0x220 [ 1514.070849] ? __local_bh_enable_ip+0x160/0x260 [ 1514.075543] vsock_shutdown+0x229/0x290 [ 1514.079557] __sys_shutdown+0x15c/0x2c0 [ 1514.083553] ? __ia32_sys_getsockopt+0x150/0x150 [ 1514.088329] ? trace_hardirqs_on+0xbd/0x310 [ 1514.092678] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1514.098247] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1514.103633] ? trace_hardirqs_off_caller+0x300/0x300 [ 1514.108773] __x64_sys_shutdown+0x54/0x80 [ 1514.112940] do_syscall_64+0x1b9/0x820 [ 1514.116847] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1514.122278] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1514.127229] ? trace_hardirqs_on_caller+0x310/0x310 [ 1514.132268] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1514.137321] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1514.144014] ? __switch_to_asm+0x40/0x70 [ 1514.148315] ? __switch_to_asm+0x34/0x70 [ 1514.152406] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1514.157287] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1514.162495] RIP: 0033:0x457569 [ 1514.165707] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1514.184641] RSP: 002b:00007f22a925cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000030 [ 1514.192376] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 0000000000457569 [ 1514.199673] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000f [ 1514.206961] RBP: 000000000072c040 R08: 0000000000000000 R09: 0000000000000000 [ 1514.214252] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f22a925d6d4 [ 1514.221548] R13: 00000000004c4af3 R14: 00000000004d8548 R15: 00000000ffffffff [ 1514.228852] [ 1514.230509] Allocated by task 24114: [ 1514.234246] save_stack+0x43/0xd0 [ 1514.237711] kasan_kmalloc+0xc7/0xe0 [ 1514.241467] __kmalloc_node+0x50/0x70 [ 1514.245281] kvmalloc_node+0xb9/0xf0 [ 1514.249014] vhost_vsock_dev_open+0xa2/0x5a0 [ 1514.253524] misc_open+0x3ca/0x560 [ 1514.257082] chrdev_open+0x25a/0x710 [ 1514.260809] do_dentry_open+0x499/0x1250 [ 1514.264878] vfs_open+0xa0/0xd0 [ 1514.268165] path_openat+0x12bc/0x5150 [ 1514.272065] do_filp_open+0x255/0x380 [ 1514.275877] do_sys_open+0x568/0x700 [ 1514.279603] __x64_sys_openat+0x9d/0x100 [ 1514.283679] do_syscall_64+0x1b9/0x820 [ 1514.287615] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1514.292812] [ 1514.294442] Freed by task 24104: [ 1514.297822] save_stack+0x43/0xd0 [ 1514.301301] __kasan_slab_free+0x102/0x150 [ 1514.305544] kasan_slab_free+0xe/0x10 [ 1514.309359] kfree+0xcf/0x230 [ 1514.312490] kvfree+0x61/0x70 [ 1514.315615] vhost_vsock_dev_release+0x4f4/0x720 [ 1514.320390] __fput+0x3bc/0xa70 [ 1514.323689] ____fput+0x15/0x20 [ 1514.326992] task_work_run+0x1e8/0x2a0 [ 1514.330895] exit_to_usermode_loop+0x318/0x380 [ 1514.335503] do_syscall_64+0x6be/0x820 [ 1514.339404] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1514.344592] [ 1514.346230] The buggy address belongs to the object at ffff8801751adb00 [ 1514.346230] which belongs to the cache kmalloc-64k of size 65536 [ 1514.359100] The buggy address is located 168 bytes inside of [ 1514.359100] 65536-byte region [ffff8801751adb00, ffff8801751bdb00) [ 1514.371179] The buggy address belongs to the page: [ 1514.376123] page:ffffea0005d46800 count:1 mapcount:0 mapping:ffff8801da802500 index:0x0 compound_mapcount: 0 [ 1514.386106] flags: 0x2fffc0000010200(slab|head) [ 1514.390795] raw: 02fffc0000010200 ffffea00060e7008 ffffea0005edd008 ffff8801da802500 [ 1514.398697] raw: 0000000000000000 ffff8801751adb00 0000000100000001 0000000000000000 [ 1514.406602] page dumped because: kasan: bad access detected [ 1514.412314] [ 1514.413946] Memory state around the buggy address: [ 1514.418887] ffff8801751ada80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1514.426261] ffff8801751adb00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1514.433640] >ffff8801751adb80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1514.441012] ^ [ 1514.445696] ffff8801751adc00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1514.453092] ffff8801751adc80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1514.460458] ================================================================== [ 1514.467823] Disabling lock debugging due to kernel taint [ 1514.480571] Kernel panic - not syncing: panic_on_warn set ... [ 1514.486509] CPU: 0 PID: 24144 Comm: syz-executor1 Tainted: G B 4.20.0-rc1-next-20181109+ #110 [ 1514.496483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1514.505848] Call Trace: [ 1514.508454] dump_stack+0x244/0x39d [ 1514.512092] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1514.517353] panic+0x2ad/0x55c [ 1514.520567] ? add_taint.cold.5+0x16/0x16 [ 1514.524748] ? preempt_schedule+0x4d/0x60 [ 1514.528918] ? ___preempt_schedule+0x16/0x18 [ 1514.533353] ? trace_hardirqs_on+0xb4/0x310 [ 1514.537687] kasan_end_report+0x47/0x4f [ 1514.541680] kasan_report.cold.8+0x76/0x309 [ 1514.546012] ? vhost_work_queue+0xc3/0xe0 [ 1514.550178] __asan_report_load8_noabort+0x14/0x20 [ 1514.555127] vhost_work_queue+0xc3/0xe0 [ 1514.559116] vhost_transport_send_pkt+0x28a/0x380 [ 1514.563987] ? vhost_vsock_dev_open+0x5a0/0x5a0 [ 1514.568669] ? virtio_transport_send_pkt_info+0x2e7/0x460 [ 1514.574219] ? __local_bh_enable_ip+0x160/0x260 [ 1514.578908] virtio_transport_send_pkt_info+0x31d/0x460 [ 1514.584296] virtio_transport_shutdown+0x1b1/0x270 [ 1514.589254] ? virtio_transport_connect+0x220/0x220 [ 1514.594288] ? __local_bh_enable_ip+0x160/0x260 [ 1514.598980] vsock_shutdown+0x229/0x290 [ 1514.602976] __sys_shutdown+0x15c/0x2c0 [ 1514.606972] ? __ia32_sys_getsockopt+0x150/0x150 [ 1514.611756] ? trace_hardirqs_on+0xbd/0x310 [ 1514.616093] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1514.621654] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1514.627034] ? trace_hardirqs_off_caller+0x300/0x300 [ 1514.632158] __x64_sys_shutdown+0x54/0x80 [ 1514.636319] do_syscall_64+0x1b9/0x820 [ 1514.640218] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1514.645601] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1514.650547] ? trace_hardirqs_on_caller+0x310/0x310 [ 1514.655575] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1514.660609] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1514.667296] ? __switch_to_asm+0x40/0x70 [ 1514.671364] ? __switch_to_asm+0x34/0x70 [ 1514.675438] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1514.680307] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1514.685509] RIP: 0033:0x457569 [ 1514.688714] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1514.707642] RSP: 002b:00007f22a925cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000030 [ 1514.715365] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 0000000000457569 [ 1514.722646] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000f [ 1514.729925] RBP: 000000000072c040 R08: 0000000000000000 R09: 0000000000000000 [ 1514.737206] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f22a925d6d4 [ 1514.744486] R13: 00000000004c4af3 R14: 00000000004d8548 R15: 00000000ffffffff [ 1514.752871] Kernel Offset: disabled [ 1514.756503] Rebooting in 86400 seconds..