[info] Using makefile-style concurrent boot in runlevel 2. [ 24.376684] audit: type=1800 audit(1543736709.527:21): pid=5771 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2419 res=0 [ 24.405061] audit: type=1800 audit(1543736709.537:22): pid=5771 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2447 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.82' (ECDSA) to the list of known hosts. 2018/12/02 07:45:21 fuzzer started 2018/12/02 07:45:23 dialing manager at 10.128.0.26:39025 2018/12/02 07:45:23 syscalls: 1 2018/12/02 07:45:23 code coverage: enabled 2018/12/02 07:45:23 comparison tracing: enabled 2018/12/02 07:45:23 setuid sandbox: enabled 2018/12/02 07:45:23 namespace sandbox: enabled 2018/12/02 07:45:23 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/02 07:45:23 fault injection: enabled 2018/12/02 07:45:23 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/02 07:45:23 net packet injection: enabled 2018/12/02 07:45:23 net device setup: enabled 07:48:29 executing program 0: syzkaller login: [ 223.994210] IPVS: ftp: loaded support on port[0] = 21 07:48:29 executing program 1: [ 224.258078] IPVS: ftp: loaded support on port[0] = 21 07:48:29 executing program 2: [ 224.572611] IPVS: ftp: loaded support on port[0] = 21 07:48:29 executing program 3: [ 224.970014] IPVS: ftp: loaded support on port[0] = 21 07:48:30 executing program 4: [ 225.278059] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.293493] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.308187] device bridge_slave_0 entered promiscuous mode [ 225.422337] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.435821] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.449682] device bridge_slave_1 entered promiscuous mode [ 225.537342] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 225.577947] IPVS: ftp: loaded support on port[0] = 21 [ 225.708478] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 07:48:31 executing program 5: [ 226.137155] IPVS: ftp: loaded support on port[0] = 21 [ 226.160384] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 226.190086] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.198844] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.211193] device bridge_slave_0 entered promiscuous mode [ 226.300967] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.308327] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.316136] device bridge_slave_1 entered promiscuous mode [ 226.326885] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 226.382468] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 226.469445] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 226.504970] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 226.522201] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 226.596436] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.610808] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.618131] device bridge_slave_0 entered promiscuous mode [ 226.685348] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.713729] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.730531] device bridge_slave_1 entered promiscuous mode [ 226.870043] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 226.914374] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 226.966156] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 226.994049] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 227.009932] team0: Port device team_slave_0 added [ 227.056003] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 227.076946] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.087962] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.101634] device bridge_slave_0 entered promiscuous mode [ 227.136799] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 227.154477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 227.175936] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 227.199583] team0: Port device team_slave_1 added [ 227.212201] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.227924] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.250897] device bridge_slave_1 entered promiscuous mode [ 227.294380] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 227.310462] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 227.341037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 227.366571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 227.392148] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 227.412196] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 227.444052] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 227.471243] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 227.489459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 227.497342] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 227.522415] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 227.546685] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 227.650846] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 227.657985] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.670054] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.729666] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 227.746841] team0: Port device team_slave_0 added [ 227.775498] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.789037] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.796427] device bridge_slave_0 entered promiscuous mode [ 227.808088] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 227.829247] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.844240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 227.870295] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 227.877645] team0: Port device team_slave_1 added [ 227.889409] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.895761] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.915487] device bridge_slave_1 entered promiscuous mode [ 227.973789] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 228.010734] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 228.028109] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 228.049012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 228.063975] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 228.094419] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 228.122644] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 228.145773] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 228.159634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 228.179290] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 228.220978] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 228.228415] team0: Port device team_slave_0 added [ 228.245479] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 228.274964] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 228.293500] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 228.329092] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.343999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 228.376348] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 228.391677] team0: Port device team_slave_1 added [ 228.398858] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 228.406020] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.412511] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.427826] device bridge_slave_0 entered promiscuous mode [ 228.440070] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 228.462140] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 228.481769] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.500462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.539791] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 228.551660] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.561749] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.589219] device bridge_slave_1 entered promiscuous mode [ 228.608455] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 228.660714] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 228.678066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 228.740567] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 228.768433] team0: Port device team_slave_0 added [ 228.780214] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 228.788662] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.803855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 228.821941] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 228.859238] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 228.866995] team0: Port device team_slave_1 added [ 228.949087] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 228.960344] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 228.971876] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.987161] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 229.012584] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 229.033429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 229.050510] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 229.135126] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 229.167655] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 229.184561] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 229.273857] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 229.289049] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 229.304853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 229.323081] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 229.336392] team0: Port device team_slave_0 added [ 229.350574] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.357090] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.364340] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.370802] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.381644] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 229.401963] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 229.429669] team0: Port device team_slave_1 added [ 229.439295] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 229.449113] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 229.491247] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 229.510753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 229.546367] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 229.600291] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 229.693061] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 229.795974] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 229.822194] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 229.837715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 229.938695] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 229.964326] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 229.986365] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 230.001086] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 230.023433] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.029867] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.036535] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.042946] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.062893] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 230.201604] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 230.210022] team0: Port device team_slave_0 added [ 230.328054] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 230.356970] team0: Port device team_slave_1 added [ 230.420478] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.426873] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.433592] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.439983] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.471092] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 230.500410] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 230.508077] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 230.529808] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 230.680988] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 230.779315] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 230.786426] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 230.809523] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 230.820213] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.826563] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.833205] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.839611] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.847315] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 230.930515] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 230.937664] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 230.946918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 230.965236] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.979949] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.987522] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 231.291618] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.298662] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.305339] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.311794] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.335953] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 232.009397] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 232.117404] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.123843] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.130555] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.136915] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.181452] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 233.039023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 234.421058] 8021q: adding VLAN 0 to HW filter on device bond0 [ 234.673000] 8021q: adding VLAN 0 to HW filter on device bond0 [ 234.874342] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 235.113351] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 235.229978] 8021q: adding VLAN 0 to HW filter on device bond0 [ 235.324649] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 235.337142] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 235.349326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.470248] 8021q: adding VLAN 0 to HW filter on device bond0 [ 235.571820] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 235.578018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 235.589199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.740683] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 235.813471] 8021q: adding VLAN 0 to HW filter on device team0 [ 235.947296] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 236.037573] 8021q: adding VLAN 0 to HW filter on device team0 [ 236.143453] 8021q: adding VLAN 0 to HW filter on device bond0 [ 236.170417] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 236.190930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 236.198105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 236.406942] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 236.428939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 236.436044] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 236.503434] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 236.609264] 8021q: adding VLAN 0 to HW filter on device team0 [ 236.779189] 8021q: adding VLAN 0 to HW filter on device bond0 [ 236.835747] 8021q: adding VLAN 0 to HW filter on device team0 [ 236.998402] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 237.017577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 237.039511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.155858] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 237.424125] 8021q: adding VLAN 0 to HW filter on device team0 [ 237.644389] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 237.651529] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 237.660387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 238.044244] 8021q: adding VLAN 0 to HW filter on device team0 07:48:43 executing program 0: ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2b5}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x7}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x4], 0x0, 0x1a200}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "7914084b165e9ec52f1595ab29ebf015f37b541a5750acb2ac95e9ad3962af352e5323b779821fa55ee14bf9"}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:48:43 executing program 1: unshare(0x240203ff) mknod(&(0x7f00000000c0)='./file0\x00', 0x1044, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000002680)='syscall\x00') readv(r0, &(0x7f0000000480)=[{&(0x7f0000000100)=""/174, 0xae}], 0x1) write$P9_ROPEN(r0, 0x0, 0x290) open(&(0x7f0000000000)='./file0\x00', 0x401, 0x0) [ 238.789391] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 07:48:44 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000080)={0x3}, 0x8) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x4, 0x0, [], [{0x80, 0x3, 0x1, 0x5, 0x1, 0x1f}, {0x6e, 0x80000000, 0x100000000, 0x57, 0x2}], [[], [], [], []]}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f00000001c0)={0x0, 0x0}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") close(r1) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) recvmmsg(r2, &(0x7f0000000200)=[{{&(0x7f0000000000)=@rc, 0x80, &(0x7f0000003440)=[{&(0x7f0000002440)=""/4096, 0x1000}], 0x1, &(0x7f00000034c0)=""/59, 0x3b}}, {{&(0x7f0000005880)=@rc, 0x80, &(0x7f0000005980)=[{&(0x7f0000000100)=""/87, 0x57}], 0x199}}], 0x2, 0x60, &(0x7f0000005d40)={0x0, r4+10000000}) [ 238.967550] *** Guest State *** [ 238.992276] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 239.020752] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 07:48:44 executing program 1: open_by_handle_at(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="08000000000000ef35162299f800"], 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/130) mmap(&(0x7f0000600000/0x4000)=nil, 0x4000, 0x0, 0x1000044031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x2300000000000000, 0xf0000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x31, r0, 0x400000) [ 239.079716] CR3 = 0x0000000000000000 [ 239.093180] RSP = 0x0000000000000000 RIP = 0x0000000000000000 [ 239.135513] RFLAGS=0x0001a202 DR7 = 0x0000000000000400 [ 239.158698] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 239.174825] CS: sel=0xf000, attr=0x0009b, limit=0x0000ffff, base=0x00000000ffff0000 [ 239.192916] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 239.228820] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 239.236835] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 239.261626] hrtimer: interrupt took 26551 ns [ 239.272932] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 239.292752] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 239.318517] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 239.351353] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 [ 239.362042] IDTR: limit=0x0000ffff, base=0x0000000000000000 07:48:44 executing program 1: open_by_handle_at(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="08000000000000ef35162299f800"], 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/130) mmap(&(0x7f0000600000/0x4000)=nil, 0x4000, 0x0, 0x1000044031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x2300000000000000, 0xf0000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x31, r0, 0x400000) [ 239.414139] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 239.448683] EFER = 0x0000000000000000 PAT = 0x0007040600070406 07:48:44 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x7fff, 0x440802) sync_file_range(r0, 0x9, 0x1, 0x7) clock_adjtime(0x0, &(0x7f0000000000)={0x7ff, 0x0, 0x3f420f0000000000}) [ 239.464706] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 239.480098] Interruptibility = 00000000 ActivityState = 00000000 [ 239.495698] *** Host State *** [ 239.501219] RIP = 0xffffffff8120262c RSP = 0xffff88018395f390 [ 239.530719] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 239.537241] FSBase=00007efd962da700 GSBase=ffff8801dae00000 TRBase=fffffe0000033000 [ 239.546912] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 239.553069] CR0=0000000080050033 CR3=00000001cd912000 CR4=00000000001426f0 [ 239.574233] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff87e01360 07:48:44 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x3, 0x2) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000380)=0x3, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="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", 0x201, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x1c) r1 = socket(0x11, 0xf, 0x0) mknod(&(0x7f0000000400)='./file0\x00', 0x8800, 0x3225) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f00000002c0)=ANY=[@ANYBLOB="0000000000854fd1510000007dac2dd78bd9f6b19ce173ba6627576e833914e430945f1a887e2db794c9cf77183cdfdac79ae1ea83265495492f2899321e403bd6d9f223eda079c82325780eb07cccadb33cd887c6c1edeee680c1bb37024d492c9f925fe33f52b5563ce3d8b10c7c5bf5b85926ef406196ae9a302f1e26cdda6afc3cb917531220979a4f864a40cc0b0dd17f867bbed0f16b585e634b576ef3fc09638144a87b1cceb6b377f0d97dfcbaadb58daa72b681827a4eded3"], 0x8) chroot(&(0x7f00000003c0)='./file0\x00') mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) getsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f00000001c0)=""/101, &(0x7f0000000280)=0x65) [ 239.594838] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 239.609885] *** Control State *** [ 239.619058] PinBased=0000003f CPUBased=b5a06dfa SecondaryExec=000000c3 [ 239.648995] EntryControls=0000d1ff ExitControls=002fefff [ 239.678915] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 07:48:44 executing program 2: socketpair$inet6(0xa, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, &(0x7f0000001000)=""/4096, &(0x7f00000002c0)=0x1000) io_submit(0x0, 0x0, &(0x7f0000000fc0)) getpeername$inet6(0xffffffffffffffff, &(0x7f00000008c0)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000980)=0x1c) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$can_raw(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x13000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x2000000}) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, 0x0) shutdown(0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f0000000040)=@ethernet={0x0, @broadcast}, 0x0) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) close(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@remote, @empty, @dev={0xfe, 0x80, [], 0x21}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000180)=0x401, 0x4) getpgrp(0x0) migrate_pages(0x0, 0x9, &(0x7f0000000040), &(0x7f0000000080)) ustat(0x8, &(0x7f0000000080)) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x550b, &(0x7f0000000000)) [ 239.696505] VMEntry: intr_info=800000b5 errcode=00000000 ilen=00000000 [ 239.713857] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 239.750250] reason=80000021 qualification=0000000000000000 [ 239.776099] IDTVectoring: info=00000000 errcode=00000000 [ 239.791069] TSC Offset = 0xffffff7e0ef0b55e 07:48:45 executing program 1: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2000000006}, 0x1c) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @remote}, 0x10) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r2, &(0x7f00000002c0), 0x400000000000027, 0x0) [ 239.798917] TPR Threshold = 0x00 [ 239.808987] EPT pointer = 0x00000001d89be01e 07:48:45 executing program 0: r0 = socket$unix(0x1, 0x3, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r3 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f00000000c0)={0x53e4, 0x5, 0x7f, 0x3}, 0x8) ioctl$TIOCGLCKTRMIOS(r3, 0x5456, &(0x7f00000002c0)={0x2, 0x6, 0x4, 0x7, 0xadc, 0x0, 0x7, 0xfff, 0x3, 0x10000, 0x1000, 0x101}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000140)={0x0, 0x1}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000440)=ANY=[@ANYRES32=r4, @ANYBLOB="ff5fefed197210"], 0xa) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) ioctl$KVM_S390_UCAS_MAP(r3, 0x4018ae50, &(0x7f0000000280)={0xeb09, 0x7ff, 0x3ff}) r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) execveat(r5, &(0x7f0000000380)="e91f7189591e9233614b00", &(0x7f0000000640)=[&(0x7f0000000480)='cgroup.procs\x00', &(0x7f0000000500)="656d306367726f75705c40707070312b2a29e6232f6367726f75702500", &(0x7f0000000540)='#^\x00', &(0x7f0000000580)='vfat\x00', &(0x7f00000005c0)='./cgroup\x00', &(0x7f0000000600)='^!\x00'], &(0x7f0000000680), 0x400) accept4(r1, &(0x7f0000000040)=@ax25, &(0x7f0000000100)=0x80, 0x80800) r6 = openat$cgroup_procs(r5, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$KDSETKEYCODE(r3, 0x4b4d, &(0x7f0000000400)={0x60c, 0x8001}) rmdir(&(0x7f00000000c0)='./file0\x00') r7 = dup2(r5, r6) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) epoll_ctl$EPOLL_CTL_DEL(r5, 0x2, r1) connect(r0, &(0x7f0000987ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r7, &(0x7f0000000240)={0x4}) mknod(&(0x7f0000000040)='./file0\x00', 0x11, 0xad) syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote={0xac, 0x1c}, @local}, @igmp={0xd, 0x0, 0x0, @broadcast}}}}}, &(0x7f0000000000)) 07:48:45 executing program 4: r0 = add_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="3058020af10cb8b56c96d27c44d58e94ea51a7dfc59e92e80d9482ca7839173a8f1143a711f5a939b4fd0072693a46c08df6616dd21be3453ecf73039a20f43acbc5376139a9070ae27dd847474d1e59b2697801e6ebd80f75ca", 0x5a, 0xfffffffffffffffd) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0xff, "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"}, &(0x7f0000000440)=0x123) keyctl$restrict_keyring(0x1d, r0, &(0x7f00000001c0)='logon\x00', &(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x221000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000", @ANYRES16=r2, @ANYBLOB="000029bd70e206050012007c0000000000b900000000010000004c74686b48162d580c"], 0x14}, 0x1, 0x0, 0x0, 0x4c080}, 0x80) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000480)=0x0) sched_rr_get_interval(r3, &(0x7f00000004c0)) [ 240.834337] PKCS8: Unsupported PKCS#8 version [ 240.852476] PKCS8: Unsupported PKCS#8 version 07:48:46 executing program 1: r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000280)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r1, &(0x7f0000000380)={0x90, 0x0, 0x3, {0x0, 0x3, 0x21, 0x8, 0x4eb4, 0x0, {0x5, 0x3, 0x3f, 0x5, 0x8, 0x3, 0x6, 0x3, 0x7f, 0x100000000, 0x101, r2, r3, 0x2, 0x3}}}, 0x90) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000000)) syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000200)={0xa0000001}) syz_open_pts(r4, 0x0) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$unix(0x1, 0x5, 0x0) dup2(r1, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0xc, 0x30, r7, 0x0) pselect6(0x40, &(0x7f0000000100)={0xfff}, 0x0, 0x0, 0x0, 0x0) 07:48:46 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000880)={{{@in=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000980)=0xe8) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000b00)={0x1, 0xfffffffffffffffa}, 0x8) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000580)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000240)=ANY=[]) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x5c000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x0, 0x2) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vsock\x00', 0x0, 0x0) openat(r1, &(0x7f0000000240)='./file0\x00', 0x80100, 0x48) open$dir(&(0x7f0000000280)='./control/file0\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000600)=0x5, 0x4) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0), 0x10) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) r2 = userfaultfd(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000340)={0x0, 0x0}) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000001c0), 0x4) syz_open_procfs$namespace(r3, &(0x7f0000000380)='ns/cgroup\x00') ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000003c0)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xd3}}}, &(0x7f0000000480)=0x84) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000004c0)={r4, 0x2, 0x20}, &(0x7f0000000500)=0xc) getrandom(&(0x7f0000000a80)=""/86, 0xffffffffffffff62, 0x3) 07:48:46 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x1, &(0x7f0000072ff8)={0x9}, 0x0, 0x8) r2 = dup2(r1, r0) io_setup(0x400000000000082, &(0x7f0000001640)=0x0) io_submit(r3, 0x2000000000000227, &(0x7f0000000140)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f00000002c0)="6e36753810a3fbf8bcaa44abc688170dbcd1f72bb4f663d5ae3efad779034107750764fec73021fc2ba9274b8d677baa4d6a82e712efd31f694f89dd336e4e5a2be6ca3969bc301b4f3b3a731cb615e2ca645e876276d91e741574f3f574ca0772aef374168e86fd3ba28f82e432e4e59221c4c41729b900e0f8dff1d4423657b68de6bf800e91e55466225c0c72947944b240f7e58c0f", 0x1}]) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) 07:48:46 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fc, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f00000005c0)="1a8c443d3a568c81cc096aa87ddab0f1b182da383fd71795f41053261e63b0b9f1283f7431b6146106716c21b43625f9194bf4b6a5dba53c46b82862a2f804121cda7e6be8fd507bb1545de629746d878f10be8036e98a270c42d6458f97b342303464e94ccb6d6f4f81941e3f3fa371596cdf17e160c992140c9dc81362f019f017", 0x82, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000300)='dctcp\x00', 0x6) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/226, 0xfffffd85}], 0x1) semget(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvfrom(r0, &(0x7f0000000380)=""/239, 0x57, 0xfffffffffffffffd, 0x0, 0x0) close(r0) 07:48:46 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="d8472600"], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000002c0)={0x0, 0x100000001, 0x9, 0x0, 0x0, 0x5}, &(0x7f0000000300)=0x14) r3 = syz_open_procfs(0x0, &(0x7f0000000080)="2f6578650000000000000f1ce3000000000000000000000000") fcntl$setstatus(r3, 0x4, 0x14400) mprotect(&(0x7f0000104000/0x3000)=nil, 0x3000, 0x0) poll(&(0x7f0000000400)=[{r1, 0x1}, {r1, 0x1410}, {r1, 0x120c}, {r1, 0x2183}, {}], 0x5, 0x8) pread64(r3, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(0xffffffffffffffff, 0xc1105518, &(0x7f0000001000)) fgetxattr(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], &(0x7f0000000340)=""/144, 0x90) ioctl$KVM_IRQ_LINE(r3, 0x4008ae61, &(0x7f0000000000)={0x0, 0x9}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000480)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)="2f6578650000000000000f1ce300", r2}, 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000640)=[{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000580)="b5d7522f9d33b63f526ccc682338444a302afa4b8659b651f6dd80f6217b3ad368cce469ca517224d7", 0x29}], 0x1, &(0x7f0000001080)}], 0x1, 0x4010) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000008c0)={0x0, 0x0, 0x72feb984}, &(0x7f0000000900)=0x10) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) ioctl$KVM_CREATE_PIT2(r4, 0x4040ae77, &(0x7f0000000500)={0x4000}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x8000}, 0x20004080) getegid() r5 = dup2(r0, r4) ioctl$KVM_HYPERV_EVENTFD(r3, 0x4018aebd, &(0x7f0000000440)={0xfffffffffffffff8, r5, 0x1}) syz_emit_ethernet(0x30, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @local, [], {@llc_tr={0x11, {@snap={0x0, 0x1, "ed", "80da46", 0x89ff, "5873867110c22f81a95a544d15c962a6faf92bb1cc24dae03057"}}}}}, &(0x7f0000000100)={0x1, 0x2, [0xb1c, 0x9e6, 0xab3, 0xb70]}) 07:48:46 executing program 2: futex(&(0x7f0000000080), 0x8f, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x1, 0x1) setrlimit(0x40000000000008, &(0x7f0000000000)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x81) capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) mlock2(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0) 07:48:46 executing program 0: r0 = socket$unix(0x1, 0x3, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r3 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f00000000c0)={0x53e4, 0x5, 0x7f, 0x3}, 0x8) ioctl$TIOCGLCKTRMIOS(r3, 0x5456, &(0x7f00000002c0)={0x2, 0x6, 0x4, 0x7, 0xadc, 0x0, 0x7, 0xfff, 0x3, 0x10000, 0x1000, 0x101}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000140)={0x0, 0x1}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000440)=ANY=[@ANYRES32=r4, @ANYBLOB="ff5fefed197210"], 0xa) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) ioctl$KVM_S390_UCAS_MAP(r3, 0x4018ae50, &(0x7f0000000280)={0xeb09, 0x7ff, 0x3ff}) r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) execveat(r5, &(0x7f0000000380)="e91f7189591e9233614b00", &(0x7f0000000640)=[&(0x7f0000000480)='cgroup.procs\x00', &(0x7f0000000500)="656d306367726f75705c40707070312b2a29e6232f6367726f75702500", &(0x7f0000000540)='#^\x00', &(0x7f0000000580)='vfat\x00', &(0x7f00000005c0)='./cgroup\x00', &(0x7f0000000600)='^!\x00'], &(0x7f0000000680), 0x400) accept4(r1, &(0x7f0000000040)=@ax25, &(0x7f0000000100)=0x80, 0x80800) r6 = openat$cgroup_procs(r5, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$KDSETKEYCODE(r3, 0x4b4d, &(0x7f0000000400)={0x60c, 0x8001}) rmdir(&(0x7f00000000c0)='./file0\x00') r7 = dup2(r5, r6) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) epoll_ctl$EPOLL_CTL_DEL(r5, 0x2, r1) connect(r0, &(0x7f0000987ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r7, &(0x7f0000000240)={0x4}) mknod(&(0x7f0000000040)='./file0\x00', 0x11, 0xad) syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote={0xac, 0x1c}, @local}, @igmp={0xd, 0x0, 0x0, @broadcast}}}}}, &(0x7f0000000000)) 07:48:46 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000280)=""/246, 0x0}) write$vnet(r0, &(0x7f00000001c0)={0x1, {&(0x7f0000000100)=""/139, 0x8b, 0x0, 0x0, 0x2}}, 0x68) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x3, 0x300) r2 = fcntl$getown(r0, 0x9) sched_rr_get_interval(r2, &(0x7f0000000040)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000200)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) [ 241.145511] __ntfs_error: 8 callbacks suppressed [ 241.145521] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 241.296629] capability: warning: `syz-executor2' uses 32-bit capabilities (legacy support in use) 07:48:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0xfffffffffffffffc, 0x2) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) pread64(r0, &(0x7f0000000400)=""/193, 0xc1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000000)=@fragment, 0x8) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0xe6d8, 0x400) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000180)=""/212, &(0x7f0000000080)=0xd4) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000018, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 07:48:46 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x100, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000040)={'mangle\x00', 0x3, [{}, {}, {}]}, 0x58) setsockopt$sock_void(r0, 0x29, 0x10000000030, 0x0, 0x300) 07:48:46 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x400000000) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-control\x00', 0x280400, 0x0) write$P9_RWALK(r1, &(0x7f00000002c0)={0x23, 0x6f, 0x1, {0x2, [{0x24, 0x4, 0x5}, {0x0, 0x2, 0x7}]}}, 0x23) rt_sigprocmask(0x0, &(0x7f0000000280)={0xfffffffffffffff8}, 0x0, 0xffffffffffffff70) r2 = gettid() timer_create(0x8, &(0x7f0000000040)={0x0, 0x6, 0x20000000004, @tid=r2}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f0000000080)={{0x0, r3+30000000}, {0x0, 0x989680}}, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x800, 0x0) write$UHID_DESTROY(r4, &(0x7f0000000180), 0x4) timer_settime(0x0, 0x0, &(0x7f0000000000)={{}, {0x0, 0xe4c}}, &(0x7f0000000100)) [ 241.577947] overlayfs: filesystem on './file0' not supported as upperdir 07:48:46 executing program 4: r0 = socket$inet6_sctp(0xa, 0x9, 0x84) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@broadcast, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000000)=0xe8) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0x9, &(0x7f0000000100)={&(0x7f0000000c00)=@newtfilter={0x92c, 0x2c, 0x300, 0x70bd2c, 0x25dfdbff, {0x0, r1, {0x7, 0xf}, {0xffff, 0x2}, {0x2, 0x3}}, [@TCA_RATE={0x8, 0x5, {0x400, 0x6}}, @TCA_RATE={0x8, 0x5, {0x101, 0x7}}, @TCA_CHAIN={0x8, 0xb, 0x7}, @TCA_RATE={0x8, 0x5, {0x8, 0x3}}, @filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x8cc, 0x2, [@TCA_ROUTE4_POLICE={0x408, 0x5, @TCA_POLICE_RATE={0x404, 0x2, [0x1f, 0x7fffffff, 0x1000, 0x1, 0x3, 0xb2, 0x6, 0x9, 0x8, 0x2, 0x7, 0x2, 0x7, 0x76, 0x2, 0x9, 0x2, 0x5f8b, 0x5, 0x1000, 0x8001, 0xf4c, 0x1f, 0x0, 0x1ff, 0x8, 0x200, 0xb5, 0xffffffff00000000, 0x401, 0x5, 0x8, 0x909a, 0x80, 0x100, 0xb9c, 0x1, 0x59, 0x80, 0x828c, 0x6, 0xff, 0x3, 0xf7, 0x3ff, 0x3b, 0x5, 0x0, 0x1, 0x2, 0x1f, 0x903, 0x6, 0xfffffffffffffffa, 0x4, 0xa605, 0x2c441e0c, 0x80000001, 0xff, 0x6, 0x0, 0x0, 0x4, 0x66cc, 0x800000000000000, 0xffffffff, 0x80, 0x10f, 0x7, 0x7, 0x31c9, 0x100000001, 0x3d238000000, 0xfffffffffffffffa, 0xffff, 0x2, 0x0, 0x2, 0xfff, 0x547c, 0xffff, 0x0, 0x7, 0x7, 0xb356, 0x8000, 0x0, 0x8, 0x5, 0x4, 0xb3, 0x500000, 0x0, 0x7, 0x1, 0x0, 0xab9d, 0x80000001, 0x1, 0x4, 0x4, 0x58b, 0x393, 0x6, 0x5, 0x8000, 0x1, 0x8, 0x7fff, 0xd1, 0x40, 0x419, 0xffffffffffffffff, 0x3, 0x6, 0x8001, 0xffffffff, 0x7ff, 0x9, 0x8, 0x3, 0xbe, 0x7, 0x0, 0x3f, 0x0, 0x3, 0xfffffffffffffff7, 0xd99, 0x9, 0xa7, 0x7ff, 0xc6, 0xa91, 0x8, 0x0, 0x201b, 0xffff, 0x3, 0x8001, 0xffffffffffffffd4, 0x8000, 0xf4b, 0x34cb, 0x2, 0x9, 0xf45, 0x100000000, 0x6adb, 0x0, 0x8000, 0x6, 0x2, 0x8001, 0x4e, 0x2, 0x9, 0x7ff, 0x2, 0x2, 0x3, 0x7f, 0x8, 0x2000000000000, 0x24, 0x761, 0x1ff, 0x5f917e43, 0x401, 0x581, 0xec, 0xea41, 0x0, 0x100000000, 0x1ff, 0xfd, 0x80000001, 0x0, 0x7, 0x81, 0xff, 0x0, 0x23, 0x3, 0x4, 0x8, 0x0, 0xb39, 0x3063, 0xffff, 0x3, 0x7ff, 0x0, 0x2, 0xc6, 0x800, 0x3, 0x4, 0x7fffffff, 0x9, 0x8, 0x0, 0x6, 0x1, 0x6, 0xffffffff, 0x4, 0x4, 0x2, 0x7, 0x7f, 0x352e, 0x6, 0xb74f, 0xada, 0x4, 0x3f, 0x0, 0x6, 0x3f, 0x6, 0x8000, 0x80, 0x2, 0x4, 0x3, 0x800, 0x100, 0x1ff, 0xa554, 0x20, 0x4, 0x8, 0xffffffffffffffc0, 0x10001, 0xcf3c, 0xc40a, 0x7c16, 0x80000000, 0x5, 0x4, 0x0, 0x1000, 0x8000, 0x200000000000000, 0x8, 0x0, 0x2, 0x80, 0x5, 0xfffffffffffffff7, 0x11d, 0xe740, 0x0, 0x8f5, 0x8]}}, @TCA_ROUTE4_ACT={0xb8, 0x6, @m_sample={0xb4, 0xa, {{0xc, 0x1, 'sample\x00'}, {0x34, 0x2, [@TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0xcb}, @TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0xfffffffffffffffc}, @TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0x7ff}, @TCA_SAMPLE_PARMS={0x18, 0x2, {0x7f, 0x101, 0xffffffffffffffff, 0x40, 0x100000001}}]}, {0x6c, 0x6, "d915667a41ab36b125cf62c4e4bb77b817fc91276b9be323f7a8e5918d48ac545c48a953585c304e222e88ae1e714690745b3f3c80a709e213c15eaddc1023e5aa569552c4521cc580fb381fe5273e53cb2b06f91943ee14cea1d26e7990bcb73b09b1558dfa"}}}}, @TCA_ROUTE4_POLICE={0x408, 0x5, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x80000000, 0xffffffff, 0x5, 0x8001, 0x8e, 0x401, 0x7fffffff, 0x7, 0x823, 0x3, 0x9, 0x0, 0x9, 0x80, 0x1, 0x401, 0x6b, 0x10001, 0x0, 0x4, 0x3, 0xff, 0xfd9, 0x5, 0x3, 0xdd5b, 0x0, 0xf5da, 0x1, 0x5, 0xffffffffffffff99, 0x1f, 0x3, 0x5, 0x5, 0x4, 0x40, 0x9, 0x6, 0x3, 0xfffffffffffffeff, 0x8, 0x1, 0x3, 0x2, 0x2, 0xd5a, 0x0, 0xffff, 0x3, 0x0, 0x100000000, 0x5, 0xa1, 0x240000000, 0x9, 0x3, 0x80, 0x4, 0x6, 0x0, 0x2, 0x5, 0x81, 0x6, 0x400, 0x6, 0x7fff, 0x75, 0x46f6, 0x41, 0x100000001, 0x3, 0x40000000000000, 0xfffffffffffffe01, 0xc9be, 0x966c, 0x9, 0x1, 0x4159, 0x3, 0xf9, 0x8, 0x7, 0xfffffffffffffe00, 0xbc, 0x1, 0x21, 0x3, 0x7, 0x2, 0x2, 0x5, 0x81, 0xffff, 0x7f, 0x2c10, 0x0, 0x4d, 0x7845, 0x3ff, 0x5, 0x0, 0xda68, 0x6, 0x3ff, 0xff, 0x3, 0x8, 0x79, 0x8, 0xff, 0x7f, 0x1, 0x9, 0x1, 0xfffffffffffffffc, 0x14, 0xffffffff, 0x4, 0x3, 0x8, 0x8, 0x10000, 0x9, 0x3d2f0f9, 0x8, 0x0, 0x1, 0xffff, 0x10000, 0x10001, 0xf9df, 0x8, 0x2, 0x401, 0x2, 0x0, 0x40, 0x3, 0x1000000000000000, 0x7, 0x5, 0xffffffffffff0914, 0x530, 0x3a6, 0x8001, 0x1, 0xfff, 0xff, 0x9, 0x73d, 0x1c00000, 0xe1c, 0x7, 0x3, 0x0, 0x0, 0xffff, 0xfffffffffffeffff, 0x1f, 0x2, 0x0, 0x400, 0x1, 0x2, 0x100000001, 0x7, 0x2, 0x4, 0xffffffff, 0x7fff, 0x8, 0xfffffffffffffffb, 0x3, 0x9, 0x81, 0x1, 0x9, 0xffe2, 0x5, 0x9, 0xd4, 0x3ff, 0xffff, 0xac80, 0x3, 0x40, 0x1, 0x1, 0x0, 0x63, 0x7, 0x2, 0x1, 0x7, 0xfffffffffffffff7, 0x7fffffff, 0x7, 0x7, 0xbe0, 0xff, 0x8, 0x9, 0x1ff, 0x7, 0xd344, 0x4, 0x392a, 0x1561, 0x3ff, 0x5, 0x2, 0x100000000, 0x20, 0xc0, 0x6, 0x10000, 0x8, 0x3, 0x401, 0x100000000, 0x8001, 0x8, 0x40, 0x100, 0x100000000, 0x7, 0x2bc1, 0x8, 0x3, 0x5, 0x2, 0x0, 0x5b4, 0x6, 0x9, 0x2d7b, 0x893, 0x3, 0x1, 0x4, 0x6, 0x6, 0x6, 0xfff, 0x8001, 0x4, 0x28000, 0xffffffff, 0x1f, 0x3, 0x7, 0x5e2, 0x6, 0x20]}}]}}, @TCA_RATE={0x8, 0x5, {0x10000, 0x98ee}}, @TCA_CHAIN={0x8, 0xb, 0x28}]}, 0x92c}, 0x1, 0x0, 0x0, 0x1}, 0x4008000) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 07:48:46 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000056000)='/dev/dmmidi#\x00', 0x6f600000, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4007, 0x0) fcntl$setstatus(r0, 0x4, 0x0) 07:48:47 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000880)={{{@in=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000980)=0xe8) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000b00)={0x1, 0xfffffffffffffffa}, 0x8) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000580)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000240)=ANY=[]) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x5c000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x0, 0x2) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vsock\x00', 0x0, 0x0) openat(r1, &(0x7f0000000240)='./file0\x00', 0x80100, 0x48) open$dir(&(0x7f0000000280)='./control/file0\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000600)=0x5, 0x4) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0), 0x10) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) r2 = userfaultfd(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000340)={0x0, 0x0}) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000001c0), 0x4) syz_open_procfs$namespace(r3, &(0x7f0000000380)='ns/cgroup\x00') ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000003c0)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xd3}}}, &(0x7f0000000480)=0x84) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000004c0)={r4, 0x2, 0x20}, &(0x7f0000000500)=0xc) getrandom(&(0x7f0000000a80)=""/86, 0xffffffffffffff62, 0x3) 07:48:47 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000005880)='attr/keycreate\x00') ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "7b3177f4fc2eb04172d2a8fdd1c4c4cf144a23173b6605afb988de7e07195d78f75dd19a3782fb25bfe2566c845a0c58b40026e6f769649cdbff0000c400", "ee52c10d1e72a943ccff00000080991a0000725ade5543129bb000"}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 07:48:47 executing program 1: socket$alg(0x26, 0x5, 0x0) syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000080)) r0 = syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x101840) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_GETFLAGS(r0, 0xc1105511, &(0x7f0000000080)) 07:48:47 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) recvmsg(r0, &(0x7f0000001480)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000001380)=[{&(0x7f0000000100)=""/27, 0x1b}, {&(0x7f0000000140)=""/153, 0x99}, {&(0x7f0000000200)=""/55, 0x37}, {&(0x7f0000000240)=""/145, 0x91}, {&(0x7f0000000300)=""/124, 0x7c}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x6, &(0x7f0000001400)=""/75, 0x4b}, 0x10143) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x40081271, 0x400020) r2 = getpgrp(0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000016c0)={r0, 0x50, &(0x7f0000001640)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001700)={r2, r0, 0x0, 0xe, &(0x7f0000001600)='/dev/swradio#\x00', r3}, 0x30) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r4, 0x20000000008912, &(0x7f0000000100)="0a5c2d0240316285717070") r5 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/keycreate\x00') r7 = mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x13, r6, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000001740)={r7}) setsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f00000014c0)=0x2, 0x4) ioctl$LOOP_SET_STATUS64(r5, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x351, 0x0, 0x0, 0x0, 0x0, 0x0, "333a7967226dc88cdd4b3fe9a3d3d456462a30a2d7e524ec38477a4fd78e0c5aff782ce7e5d25783c021732af457bd8d030d2129837228028db6e68ed0ed71c9", "ee369ac65b7c48a0f85e4c14f0c99087b233f43894215adbd9da650737f8eecd65ad73b661b8a4912d778a0d18167ec6764f75480ba544786b77f6096483dfe7", "92e4c5a35314133e1368d102dce15ea4f4d39cb3644ebd0a0f807c17071cf095"}) ioctl$LOOP_CHANGE_FD(r5, 0x4c06, r6) 07:48:47 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x40000040101) write$sndseq(r0, 0x0, 0xffffffffffffffe8) r1 = epoll_create(0x105) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)={0x2008}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4000, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000180)={{0x1, 0xd000, 0x1d, 0x6cc0, 0x5, 0x20, 0x3, 0x8, 0x2, 0x3882, 0x2, 0x1}, {0x0, 0xf000, 0xe, 0x0, 0x60, 0xfffffffffffffffe, 0x2, 0x6, 0x2, 0x7, 0x1ff}, {0x6000, 0x105000, 0xf, 0x10001, 0x72, 0x0, 0xfffffffffffffff8, 0x101, 0x2, 0x0, 0x5, 0x1000}, {0x1, 0x1, 0x1e, 0xffffffff, 0x1000, 0x8001, 0x2, 0x6, 0x0, 0xffffffffffff0001, 0x9, 0x5}, {0x1, 0x4000, 0xd, 0x7, 0x7f, 0x9, 0x8, 0x40, 0x4, 0x5, 0x0, 0x4}, {0x0, 0xf000, 0xf, 0x0, 0x3, 0x5, 0x4, 0x4, 0x9, 0x6, 0x6, 0x9}, {0x7000, 0xa83c18a251ef6c3e, 0x0, 0x2, 0x9, 0x3ff, 0xfff, 0x0, 0x7bd, 0x5, 0x7, 0x609c}, {0x17001, 0x4004, 0x10, 0x95e, 0x400, 0x84, 0x1000, 0x800, 0xfffffffffffffffe, 0x80000000, 0x20, 0x1}, {0x7000, 0x7000}, {0xd001, 0x4000}, 0x20, 0x0, 0x5000, 0x1, 0xf, 0x0, 0xd000, [0xe9d6, 0x0, 0x7, 0x80000001]}) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, &(0x7f0000000040)=0x6413) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f000023efa8)={0x7f, 0x800003, 0xff, 0xfffffffffffffffd, 0xfffffffffffffffe, 0xfffffffffffffffd}) [ 242.109595] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.116141] b_state=0x0000002b, b_size=512 [ 242.120440] device loop0 blocksize: 4096 [ 242.124512] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.130809] b_state=0x0000002b, b_size=512 [ 242.135046] device loop0 blocksize: 4096 [ 242.139180] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.145422] b_state=0x0000002b, b_size=512 [ 242.149703] device loop0 blocksize: 4096 [ 242.153770] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.160300] b_state=0x0000002b, b_size=512 [ 242.164538] device loop0 blocksize: 4096 [ 242.168657] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.174891] b_state=0x0000002b, b_size=512 [ 242.179175] device loop0 blocksize: 4096 [ 242.183293] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.189686] b_state=0x0000002b, b_size=512 [ 242.193916] device loop0 blocksize: 4096 [ 242.197990] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.204292] b_state=0x0000002b, b_size=512 [ 242.208521] device loop0 blocksize: 4096 [ 242.212642] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.218887] b_state=0x0000002b, b_size=512 [ 242.223101] device loop0 blocksize: 4096 [ 242.227151] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.233410] b_state=0x0000002b, b_size=512 [ 242.237640] device loop0 blocksize: 4096 [ 242.241759] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.247985] b_state=0x0000002b, b_size=512 [ 242.252269] device loop0 blocksize: 4096 [ 242.256340] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.262616] b_state=0x0000002b, b_size=512 [ 242.266844] device loop0 blocksize: 4096 [ 242.266930] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.266937] b_state=0x0000002b, b_size=512 [ 242.266943] device loop0 blocksize: 4096 [ 242.266976] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.291952] b_state=0x0000002b, b_size=512 [ 242.291962] device loop0 blocksize: 4096 [ 242.291979] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.291986] b_state=0x0000002b, b_size=512 [ 242.291991] device loop0 blocksize: 4096 [ 242.292004] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.292026] b_state=0x0000002b, b_size=512 [ 242.292032] device loop0 blocksize: 4096 [ 242.292045] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.292050] b_state=0x0000002b, b_size=512 [ 242.292056] device loop0 blocksize: 4096 [ 242.292069] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.292076] b_state=0x0000002b, b_size=512 [ 242.300523] device loop0 blocksize: 4096 [ 242.300543] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.335836] b_state=0x0000002b, b_size=512 [ 242.354614] device loop0 blocksize: 4096 [ 242.354641] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.354651] b_state=0x0000002b, b_size=512 [ 242.354659] device loop0 blocksize: 4096 [ 242.354678] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.369226] b_state=0x0000002b, b_size=512 [ 242.369235] device loop0 blocksize: 4096 [ 242.369260] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.369268] b_state=0x0000002b, b_size=512 [ 242.369276] device loop0 blocksize: 4096 [ 242.369296] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.369303] b_state=0x0000002b, b_size=512 [ 242.369311] device loop0 blocksize: 4096 [ 242.369329] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.369339] b_state=0x0000002b, b_size=512 [ 242.442230] device loop0 blocksize: 4096 [ 242.446291] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.452569] b_state=0x0000002b, b_size=512 [ 242.456799] device loop0 blocksize: 4096 [ 242.460944] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.467170] b_state=0x0000002b, b_size=512 [ 242.471468] device loop0 blocksize: 4096 [ 242.475552] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.482136] b_state=0x0000002b, b_size=512 [ 242.486377] device loop0 blocksize: 4096 [ 242.490486] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.496714] b_state=0x0000002b, b_size=512 [ 242.501006] device loop0 blocksize: 4096 [ 242.505081] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.511367] b_state=0x0000002b, b_size=512 [ 242.515596] device loop0 blocksize: 4096 [ 242.519724] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.525951] b_state=0x0000002b, b_size=512 [ 242.530224] device loop0 blocksize: 4096 [ 242.534289] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.540544] b_state=0x0000002b, b_size=512 [ 242.544788] device loop0 blocksize: 4096 [ 242.548888] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.555114] b_state=0x0000002b, b_size=512 [ 242.559408] device loop0 blocksize: 4096 [ 242.563478] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.569741] b_state=0x0000002b, b_size=512 [ 242.573981] device loop0 blocksize: 4096 [ 242.578053] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.584319] b_state=0x0000002b, b_size=512 [ 242.588600] device loop0 blocksize: 4096 [ 242.592676] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.598933] b_state=0x0000002b, b_size=512 [ 242.603163] device loop0 blocksize: 4096 07:48:47 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x20000) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000380)) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000080)=0x1000, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000400)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0)="5d71f27e79ae18a9307d3ad987bde5f943e8ad91f720cfe21e05ed8b721e0ef4c45a65b156b13090e4e14239017021314f912f2b3015486cda955f5a3122ea923ca8d9a814a3a856c40199034a818c08e0ffabccebf4833b5d8ef14652d5036a99b4739144a86ad9dd49d944855696e16418860989b336e75e7ec57cfe4c1d4133138141764b0803495363c723da79eb5589650b51a885db7b430abbadafb126e512e742e2a64e610b96995b2cc2baa14ef6f7be6e0c227a41eced186639c0f680a42f5dbd22b788e7069f27d5327bb16079780164da906093", 0xd9) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r2, r3) chdir(&(0x7f0000000340)='./file0\x00') getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={0x0}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000240)={r4, 0x3}, &(0x7f00000003c0)=0x8) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000900)={&(0x7f00000002c0), 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB="7000fddb666b000000000000030000000000"], 0x1}}, 0x10) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f00000008c0), 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000680)) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000000c0)=0x1c) r5 = perf_event_open(&(0x7f0000000740)={0x0, 0x70, 0x0, 0x0, 0x0, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x40000000004, 0x1, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffe00, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000700)}, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000880)=0x4) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000180)={'veth0_to_bridge\x00', 0x1}) flock(r5, 0x8) flock(r0, 0x2) socket$nl_generic(0x10, 0x3, 0x10) fcntl$setsig(r0, 0xa, 0x24) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x4, 0x1f) 07:48:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x40045436, 0x1) 07:48:47 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r2 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000180)={"627269646765300000010000001100"}) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) ioctl$sock_netdev_private(r2, 0x89f7, &(0x7f00000003c0)="4d8ddf256131fe006a402c314a0f2abcbf9e2a30cffbec5daa72b5ad6ecd85b108dc5161e71ca6b69c2256c7faef64b99d4f663f145825879d9873bfafca7f557db4b58e08cde713a35624e2b0ec300033171586c7745aceeb1509d9450b2b25746414554e9beb8fba41e92e51d8a312fda70f8efc328300189fc1d06d271c66bd0370cfecb92c2b9ef2ede393b9a4b882756a000004bac81b77d3e20e26bc713935f88a8e29de35e5b7b0e99f46297bc1aa4ab215b4f4de8b328f19aeb2555f85bd6292210021c1d41554c697dd672bb4adcc8bbd7d91ab1fdf85a4cafa04d3ad76bef153723344a56c3305000c66d84d93dc0dc20b9a70a1") socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000380)) kcmp(0x0, r3, 0xfffffffffffffff9, r2, r2) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) dup3(r2, r0, 0x0) 07:48:47 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000005880)='attr/keycreate\x00') ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "7b3177f4fc2eb04172d2a8fdd1c4c4cf144a23173b6605afb988de7e07195d78f75dd19a3782fb25bfe2566c845a0c58b40026e6f769649cdbff0000c400", "ee52c10d1e72a943ccff00000080991a0000725ade5543129bb000"}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) [ 242.607243] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.613655] b_state=0x0000002b, b_size=512 [ 242.617891] device loop0 blocksize: 4096 [ 242.622022] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.628248] b_state=0x0000002b, b_size=512 [ 242.632558] device loop0 blocksize: 4096 [ 242.636633] __find_get_block_slow() failed. block=2, b_blocknr=16 [ 242.644376] b_state=0x0000002b, b_size=512 [ 242.648643] device loop0 blocksize: 1024 07:48:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8010aebb, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x101000, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000003000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000080)="263e670fc7ff0f05c401fc298600000000c4a2259014ef47df431367decb66b825000f00d00f01f8660f38817f00f79a00000000", 0x34}], 0x1, 0x1, &(0x7f0000000100), 0x0) 07:48:47 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000040)=0x2ee90045) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap$perf(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x1010, r1, 0x0) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f00000000c0)) 07:48:47 executing program 2: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)="646576707473007668d27021730a4068612ec18805891d08b3586492591b8cc0d0f495328c214a43d15d556ca280198820d4620f878950b44df75d77a9b6c37d160c8775656724d92c8c9bbb2afe95b8a19a5641b73377df2fa9c58ee1efc58d1638ba22838be2f72afad2306194c7796946070b14d2c17a949d9d072aabead94565aca23870a2a19a3bb46fa0f1d7265b32f282bcc27475fbf5b159d6a91bbe63de418d945729932cac0286d10d00ef5af35984db46f275a18b5f9f65fe5b71b15cce6e08432081", 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200000, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) poll(0x0, 0x0, 0x400007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') [ 242.765404] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.776136] bridge0: port 1(bridge_slave_0) entered disabled state 07:48:48 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000880)={{{@in=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000980)=0xe8) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000b00)={0x1, 0xfffffffffffffffa}, 0x8) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000580)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000240)=ANY=[]) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x5c000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x0, 0x2) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vsock\x00', 0x0, 0x0) openat(r1, &(0x7f0000000240)='./file0\x00', 0x80100, 0x48) open$dir(&(0x7f0000000280)='./control/file0\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000600)=0x5, 0x4) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0), 0x10) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) r2 = userfaultfd(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000340)={0x0, 0x0}) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000001c0), 0x4) syz_open_procfs$namespace(r3, &(0x7f0000000380)='ns/cgroup\x00') ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000003c0)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xd3}}}, &(0x7f0000000480)=0x84) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000004c0)={r4, 0x2, 0x20}, &(0x7f0000000500)=0xc) getrandom(&(0x7f0000000a80)=""/86, 0xffffffffffffff62, 0x3) 07:48:48 executing program 3: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000040)={0x3, 0x0, @value}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="000005000180c200000e0180c20000038c88fc3c1274aaaaaaaaaaaaaaaaaaaaaaaac70b871c29e03a510d912660e9e2e4b9a9f1f2d035b8b0a12071bd09de0e2b0d60820e376418667d249d0cdaa66af6c874d2ab5433ac1285ff7f6072eabca740edde55dacb52cc5931a08894bd975f"]) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x5) fcntl$getown(r0, 0x9) 07:48:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xe, 0x24, &(0x7f0000000380)=ANY=[@ANYBLOB="61124c00000000000000bf2000000000000007000000082100003d03010000000000950000000000000071260000000000006706000002000000bf25000000000000620500000e0000000f65000000000000bf540000000000000704000004faff003d4301000000000095000000000000005d54090000000000bf250000000000000f65000000000000070500000e000000bf5400000000000007240000040000003d4301000700000095000000000000006154000000000000bf25000000000000070500000e0000001f6200000000000007050000040000000f65000000000000bf5400000000000007040000040000003d3201000000000000004d54000000000000b70000000000000095000000000000000000000000000000000000008b37059a39c7a577fc170f1caee0fe2c7399dcad82bad713364d87bd782423ea3a49d8c1dd429f789af01171f005ae4c875e8fcbad947a7c3d3f5ec587eb1469cdf2b0a0610c"], &(0x7f0000000100)='GPL\x00'}, 0x48) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000600), &(0x7f0000000640)=0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xa4, &(0x7f0000000200)=[@in={0x2, 0x4e22, @rand_addr=0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0xffffffff, @local}, @in6={0xa, 0x4e24, 0xfffffffffffffff8, @loopback}, @in6={0xa, 0x4e20, 0x4, @empty, 0x7}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xa}}, @in={0x2, 0x4e24, @multicast1}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000500)={r1, @in={{0x2, 0x4e22, @local}}, 0xffffffffffffff80, 0x76}, &(0x7f00000005c0)=0x90) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000002c0)={r1, @in={{0x2, 0x4e21, @multicast1}}, 0x805f, 0x9, 0x7fffffff, 0x8, 0x20}, 0x98) 07:48:48 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x40, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000100)={0x13, 0x7, 0x1, {{0x6, 'ppp1-Y'}, 0x4}}, 0x13) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) close(r0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="61c3"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, 0x0}], 0x1, 0x0, &(0x7f0000000400), 0x0) r3 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x4, 0x2000) getsockopt$inet_mreq(r3, 0x0, 0x23, &(0x7f0000000040)={@multicast2, @broadcast}, &(0x7f0000000140)=0x8) r4 = add_key$keyring(0x0, &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r4, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)=0xffff) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000580)={&(0x7f000000b000/0x2000)=nil, &(0x7f0000002000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000001000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f000000b000/0x1000)=nil, &(0x7f000000a000/0x2000)=nil, &(0x7f000000e000/0x2000)=nil, &(0x7f000000b000/0x2000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000017000/0x1000)=nil, &(0x7f0000000500), 0x0, r1}, 0x68) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) bind$bt_l2cap(r3, &(0x7f0000000180)={0x1f, 0x7fffffff, {0x1, 0x582, 0x0, 0x800000000, 0xfffffffffffffbff, 0x4}, 0x0, 0x6}, 0xe) 07:48:48 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$KVM_SET_PIT2(r2, 0x4070aea0, &(0x7f0000000040)={[{0x7, 0x7, 0xaa2, 0x7f, 0x92, 0x8, 0x0, 0x7ff, 0x1f, 0x8, 0x6, 0x7, 0xffff}, {0x0, 0x4, 0x1, 0x1c, 0x7, 0x7, 0xffffffffffffffe1, 0x10000, 0x8, 0x1, 0x9, 0x4, 0x10001}, {0x7fff, 0x10001, 0x8, 0xa4, 0x9, 0x400, 0x2, 0x800, 0x7, 0x5, 0x8001, 0x9, 0x7}]}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) dup2(r0, r1) close(r0) socket$vsock_dgram(0x28, 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000700)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 07:48:48 executing program 1: io_setup(0x5, &(0x7f0000000100)=0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000006200)={'vcan0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000006380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000006340)={&(0x7f0000000180)=ANY=[@ANYBLOB="e40000002800200028bd7000fedbdf2500000000", @ANYRES32=r2, @ANYBLOB="0900000010000a00060007000c000100686673630000000064000200100003005c0000000004000040000000100003002f1f000004000000010000001000010008000000010000800605000010000300050000000100000000f0ffff100001000000010001040000f7ffffff100002000400000072050000090000000800010061746d002c00020008000400f1fff3ff08000800000000000000010043fc2852204fbe05033f2df0f1fd3f0099", @ANYRES32=r1, @ANYBLOB="080004000500f3ff08000100", @ANYRES32=r1, @ANYBLOB="08000100647272000c00020008000100060000000800050002000000"], 0xe4}, 0x1, 0x0, 0x0, 0x40}, 0x4) io_submit(r0, 0x1, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) r3 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x800) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 243.057056] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 07:48:48 executing program 5: r0 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f00000000c0)=0x1c, 0x80800) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000100), &(0x7f00000001c0)=0x4) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x100000001, 0x8400) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mknod(&(0x7f0000000300)='./file0/file0\x00', 0x8203, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000280)=0x47) r2 = socket(0x10, 0x2, 0xc) write(r2, &(0x7f0000000040)="1f000000010101000100feff06110000f30501000800010001736759365742", 0x1f) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000200)={0x2, 0x180000000, 0x0, 0x3, 0x8, 0x9, 0x22, 0x100000000, 0x7, 0x6}) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x10) 07:48:48 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt(r0, 0x6, 0x6, &(0x7f00000001c0)=""/177, &(0x7f0000000140)=0xb1) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xfff, 0x0) bind$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x6, {0x100000000, 0x3, 0x6, 0x100000000, 0xffff, 0x3ff}, 0x1}, 0xe) ioctl(r1, 0x5000008912, &(0x7f0000000180)="0a5c2d023c126285718070") syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x21, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x140]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f0000000100)={0x0, 0x2, [0x0, 0xad4]}) 07:48:48 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') write$eventfd(r0, &(0x7f0000000040)=0x6b2d28f0, 0x8) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) acct(0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)=0x0) setxattr$security_evm(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@sha1={0x1, "671366ad48f274eb223d4cf0d41eb185a04b0e0e"}, 0x15, 0x1) r2 = gettid() kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f00000000c0)={r0, r0, 0x100000000}) [ 243.266060] dccp_invalid_packet: P.Data Offset(68) too large [ 243.316089] audit: type=1804 audit(1543736928.467:31): pid=7729 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir429992348/syzkaller.7oEmQK/12/file0" dev="sda1" ino=16539 res=1 [ 243.349710] netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. 07:48:48 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @dev}, @icmp=@parameter_prob={0xc, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x5c}, @dev}}}}}}, &(0x7f0000000140)) r0 = socket$bt_rfcomm(0x1f, 0x1, 0x3) r1 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000080)=0x1a, 0x1) [ 243.358580] netlink: 4 bytes leftover after parsing attributes in process `syz-executor5'. [ 243.359229] Process accounting resumed [ 243.370554] netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. [ 243.380244] netlink: 4 bytes leftover after parsing attributes in process `syz-executor5'. 07:48:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x30000004}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000939ff4)={0x2000201f}) r3 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) write$P9_RMKNOD(r3, &(0x7f0000000080)={0x14}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r0, &(0x7f0000000000), 0x1) ioctl$int_in(r3, 0x80000000005001, 0x0) socket$inet_udp(0x2, 0x2, 0x0) [ 243.407540] audit: type=1804 audit(1543736928.557:32): pid=7729 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir429992348/syzkaller.7oEmQK/12/file0" dev="sda1" ino=16539 res=1 [ 243.431208] Process accounting resumed 07:48:48 executing program 2: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)="646576707473007668d27021730a4068612ec18805891d08b3586492591b8cc0d0f495328c214a43d15d556ca280198820d4620f878950b44df75d77a9b6c37d160c8775656724d92c8c9bbb2afe95b8a19a5641b73377df2fa9c58ee1efc58d1638ba22838be2f72afad2306194c7796946070b14d2c17a949d9d072aabead94565aca23870a2a19a3bb46fa0f1d7265b32f282bcc27475fbf5b159d6a91bbe63de418d945729932cac0286d10d00ef5af35984db46f275a18b5f9f65fe5b71b15cce6e08432081", 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200000, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) poll(0x0, 0x0, 0x400007f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 07:48:48 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000203010002000270fff8", 0x16}], 0x0, 0x0) r2 = dup2(r1, r0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000100)={0x0, 0x7}, &(0x7f00000011c0)=0x8) ioctl$EXT4_IOC_RESIZE_FS(r1, 0x40086610, &(0x7f0000001280)=0x401) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000001200)={r3, 0x5d}, &(0x7f0000001240)=0x8) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) read$FUSE(r4, &(0x7f00000001c0), 0x1000) socket$unix(0x1, 0xed6480babd87dd0b, 0x0) r5 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r5, 0x800000c004500a, &(0x7f0000000040)) write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f00000000c0)={0xffffffffffffffd3, 0x5, 0x100000000000000, {0x0, 0x0, 0x0, 0xb00020000000000}}, 0xfffffefd) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14) dup2(r0, r5) 07:48:48 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') write$eventfd(r0, &(0x7f0000000040)=0x6b2d28f0, 0x8) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) acct(0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)=0x0) setxattr$security_evm(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@sha1={0x1, "671366ad48f274eb223d4cf0d41eb185a04b0e0e"}, 0x15, 0x1) r2 = gettid() kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f00000000c0)={r0, r0, 0x100000000}) 07:48:48 executing program 4: r0 = open(&(0x7f0000000000)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000140)='./file0\x00') write$eventfd(r0, &(0x7f0000000040)=0x6b2d28f0, 0x8) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) acct(0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)=0x0) setxattr$security_evm(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@sha1={0x1, "671366ad48f274eb223d4cf0d41eb185a04b0e0e"}, 0x15, 0x1) r2 = gettid() kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f00000000c0)={r0, r0, 0x100000000}) [ 243.740623] audit: type=1804 audit(1543736928.897:33): pid=7752 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir457924292/syzkaller.MwWDC1/8/file0" dev="sda1" ino=16539 res=1 [ 243.741555] Process accounting resumed [ 243.773157] Process accounting resumed 07:48:48 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x400000000000072, 0xffffffffffffffff, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, &(0x7f0000001a00)=0xffffff00) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x400000, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) [ 243.860591] FAT-fs (loop5): bogus sectors per cluster 3 [ 243.881318] audit: type=1804 audit(1543736928.917:34): pid=7755 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir429992348/syzkaller.7oEmQK/13/file0" dev="sda1" ino=16555 res=1 07:48:49 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x121000, 0x1) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000001c0)={@in={{0x2, 0x4e22, @loopback}}, 0x5d00, 0x400, 0x1, "1b6a2d7039a834ffff3a52346c06baff2f2268139d5a9933b604ed18d8d74a458246358270f4a1ef4c9df6017655b3b145a37a852e9da87ea476bf3db3a6cbe82785e197cf54f14a187bd9d5f0f2a6d3"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x4e24, 0xb48e, @ipv4={[], [], @empty}, 0x5}}, 0x1, 0x6, 0x0, "3c52a71a9a1f8aa94a75308b604b8bf65ce7c6a33180024c96291620c28ff440bfcceb578284c3e8919e995ba0baa0ab8e814e46c5d6012ccfbdfb8c5ff1faed6a14caafb2e5b9942cf0e8b444932c50"}, 0xd8) r2 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r2, 0x1265) 07:48:49 executing program 1: pipe(&(0x7f0000bbc000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f0000000140)={{0x9, 0x2}, 0x1, 0xfffffffffffff801, 0xffffffff00000000, {0x401, 0x9}, 0x6, 0xfff}) rt_sigprocmask(0x0, &(0x7f0000072ff8)={0x7fffffff}, &(0x7f00000000c0), 0x8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)=ANY=[]) fcntl$setstatus(r0, 0x4, 0x2000) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r3, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) sendfile(r2, r3, &(0x7f00000002c0), 0x9) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) stat(&(0x7f0000000680)='./file0\x00', &(0x7f0000000740)) sendto$inet(r3, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty=0xe000000}, 0x6) 07:48:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0xc0045878, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8a0f, 0x2) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000040)) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914}) 07:48:49 executing program 5: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000072ff8)={0x7fffffff}, &(0x7f00000000c0), 0x8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)=ANY=[]) fcntl$setstatus(r0, 0x4, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) r4 = open(&(0x7f00000004c0)='./file0/file0\x00', 0xa800, 0xe6) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r3, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) stat(&(0x7f0000000680)='./file0\x00', &(0x7f0000000740)) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x1, "a19babd1a8a19148"}) writev(r3, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) sendmsg(r3, &(0x7f0000000700)={&(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000002600)}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000540)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000580)=0x18) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) exit_group(0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000200)='htcp\x00', 0x5) sendto$inet(r3, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty=0xe000000}, 0x6) dup2(r1, 0xffffffffffffffff) io_setup(0x2, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r1, 0x6, 0x3, &(0x7f0000000480), 0x4) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x0, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x35e}]}, 0x24}, 0x1, 0x0, 0x0, 0x3bc6d0a49ed2cd65}, 0x0) [ 243.915161] FAT-fs (loop5): Can't find a valid FAT filesystem 07:48:49 executing program 4: syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x390, 0xfffffffffffffffb) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) [ 244.068810] dns_resolver: Unsupported server list version (0) 07:48:49 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x400, 0x0) r0 = socket$inet(0x2, 0x801, 0x3) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000001180)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) [ 244.116980] dns_resolver: Unsupported server list version (0) 07:48:49 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSBRKP(r1, 0x7b9, 0x710003) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000000)={0x0, 0x7, 0x2, [0xfff, 0xc5]}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000080)={r2, 0x1c, "e3801ad94d3a6575d8d3d4fddea860365e2059be32ada5716035d971"}, &(0x7f00000000c0)=0x24) 07:48:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000140), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x400000, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f0000000240)={0x3, 0x1, [0x2, 0x2, 0x2f37874e, 0x1, 0xffffffffffffff4f, 0xffffffffffff8000, 0x2, 0x5]}) getsockopt$sock_buf(r0, 0x1, 0x1f, &(0x7f0000000040)=""/253, &(0x7f0000000180)=0xfffffffffffffc70) 07:48:49 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x24200, 0x0) r2 = getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@dev, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000840)=0xe8) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000940)=0x0) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40)={0x0, 0x0, 0x0}, &(0x7f0000000a80)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000ac0)=0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getegid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000bc0)={0x0}, &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40)={0x0, 0x0}, &(0x7f0000000c80)=0xc) getgroups(0x1, &(0x7f0000000cc0)=[0xffffffffffffffff]) r14 = fcntl$getown(r0, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d00)={{{@in6=@ipv4={[], [], @broadcast}, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000000e00)=0xe8) getresgid(&(0x7f0000000e40)=0x0, &(0x7f0000000e80), &(0x7f0000000ec0)) sendmsg$unix(r1, &(0x7f0000000fc0)={&(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000006c0)=[{&(0x7f0000000380)="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", 0xfb}, {&(0x7f0000000140)="44e760f0d16c752ac2cec7c8f13dd3870d283dc242c9b403632de7fda47db4c2d447f59131f5fd666f9c2b3457367a661a8e662c928ab7dde598c4d23c", 0x3d}, {&(0x7f0000000480)="7179a5dfdcea8a8c63b01a2717150206cfaa242e16420dc147b92fcfcd083e5e951f8e67a747cfc931ab898c4e921aac7e4ef8653d9a2e6f17ed63e892dd875fd0a7e0d3c956708b78f416376c440499b5", 0x51}, {&(0x7f0000000500)="cbf42368ca02dca5057474a6a74e5b0529a91169b242c0a609cad4ff96930d04bb895c2ba1387e072322ef45c85b85259c2a93f3dd99d20df5dde84a3c24595977f48cb5be902240079e4dcf78e68cd537810bf57e6f3a26aea08a63323d1bd8560da1c0", 0x64}, {&(0x7f0000000580)="51c524cc649919c6bc3c4eebe8114e1d9fe6bc465b43679780a487694ae2c2380287d0b50bf33617b8693f3d9620c9adb821d9b865b9af873c060995c61452d63f57ad233085f41cb1cc191ba84ce1a4e70ef194ccba610bb082de95e7be0abf9d63495bc001d160d894bc7111dff7c074773fce0cf9feaae84caf3a5de0eaf21b9d95674cabb77c67c82aeaa49760f19da9c7fce96a03dd5d1dcb5c7ae9297ea9f74c218f4c0b318e0b9c9c8f65a3bf42fbb449337a2173c9807155c83fc08d8bca3a85be29bec1f053c221bc1aead24e713818818d4de05cc9c27a0dfad109efbe6f436ac99eaf1f8befc15091ca48b379cc", 0xf3}, {&(0x7f0000000680)="dab4ca1359481f6bf7e76967760d995b6f7e4a4d", 0x14}], 0x6, &(0x7f0000000f00)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @cred={0x20, 0x1, 0x2, r11, r12, r13}, @cred={0x20, 0x1, 0x2, r14, r15, r16}], 0xa0, 0x840}, 0x20000800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000180)=""/112, 0x70) getdents64(r0, &(0x7f00000000c0)=""/61, 0x3d) bind(r17, &(0x7f0000000240)=@vsock={0x28, 0x0, 0xffffffff}, 0x80) 07:48:49 executing program 4: unshare(0x8000400) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008916, &(0x7f0000000180)="0a5c2d023c126285718070") r1 = socket$packet(0x11, 0xffffffffffffffff, 0x300) setsockopt$packet_int(r1, 0x107, 0x13, &(0x7f0000000040), 0x4) 07:48:49 executing program 3: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x2}, 0x1c) sendto$inet6(r2, &(0x7f00000001c0), 0x60f, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x40000ab11, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={0x0, 0xffffffff00000001, 0x1, 0x7ff, 0x1f, 0x8}, &(0x7f0000000080)=0x14) setns(r1, 0x10000000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000140)={r3, 0x44b6, 0xfffffffffffffff9, 0x101, 0x401, 0x8, 0x2, 0x4, {r4, @in6={{0xa, 0x4e22, 0x1, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xa}}, 0xfffffffffffffffa}}, 0x7ff, 0x81, 0x8, 0x7fff, 0xffffffffffff8000}}, &(0x7f0000000200)=0xb0) setsockopt$inet_opts(r0, 0x0, 0x2ccaa056dde87361, &(0x7f0000000300)="a1d324c1bdd63581247f670a37ed99d8ce7ca09190ab562ce7322d93f7f8e4a64e5466206109201a858614bf01aa708b7b940d99afa7f0cb9fa88ed486c825d498f44186684e791ce8befce60c6e2700a05512c1410c88305d7928913f4ad5751967588b2aaad89ebfe332600109f5ef6b1a1c15548025b80238929f9aee06ba08750cc139d8e5595f95d43d66a9d4c74e", 0x91) 07:48:49 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000300)={{0x0, 0x3, 0x0, 0x0, 0x5}, 0x0, 0x0, 'id1\x00', 'timer1\x00'}) 07:48:49 executing program 0: syz_mount_image$vfat(&(0x7f0000001680)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000dfff, 0x1, &(0x7f0000000040)=[{&(0x7f00000016c0)="eb64c86d4f66732e66617400020441000500077008f8", 0x16}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, 0x0, 0xfffffffffffffdee) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000600)="0100", 0x1ff) sync() mknod(&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x9, &(0x7f00000002c0)) r1 = syz_open_dev$midi(&(0x7f0000000300)='/dev/midi#\x00', 0x200, 0x200000) io_cancel(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={"6902000080009a568df98000"}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000200), 0xc, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_deladdr={0x18, 0x15, 0x101}, 0x18}}, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) utime(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000540)={0x0, 0x1}) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f0000000000)={0x1, 0x4, 0x3}) umount2(&(0x7f0000000340)='./file0\x00', 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) lstat(&(0x7f00000008c0)='./file0/file0\x00', &(0x7f0000000d80)) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) stat(&(0x7f0000000f00)='./file0/file1\x00', &(0x7f0000000f40)) 07:48:49 executing program 5: bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x11}, 0x10) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000540)=@security={'security\x00', 0xe, 0x4, 0x408, 0x128, 0x128, 0x128, 0x220, 0x0, 0x370, 0x370, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000040), {[{{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x3, 0x3}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x5, [0x9, 0x8, 0x1, 0x10001, 0x10000, 0x1], 0x1, 0x1, 0x101}, {0x3, [0x7977, 0x2, 0x3, 0x8, 0x7, 0x6], 0x0, 0x5, 0x1f}}}}, {{@ip={@multicast1, @loopback, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'ifb0\x00', {0xff}, {}, 0x89, 0x3, 0x20}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0xe9, 0x8c, 0x20, 0x558, 0x3, 0x39f6], 0x6, 0x52c}, {0x8, [0x1, 0x82a2, 0x5, 0x40000000, 0x8, 0x8], 0x4, 0xffffffffffffff80, 0x2}}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@unspec=@pkttype={0x28, 'pkttype\x00', 0x0, {0x0, 0x7}}, @common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x240, 0x800}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x9, [0x20000, 0x2, 0x6, 0x400, 0x40, 0x101], 0x1ff, 0x4, 0x8}, {0x8, [0x7, 0x8, 0x5, 0x7, 0x9000000000, 0x20], 0x4c7, 0x7, 0x7}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x468) 07:48:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/1, 0x1}], 0x20000000000000e4) r1 = gettid() ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f00000003c0)={0x9, &(0x7f0000000280)=[{0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @local}]}) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x7b69}, 0x2) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000280)}}, &(0x7f0000000140)) syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x0, 0x2) close(r0) timer_settime(0x0, 0x1, &(0x7f0000000200)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f00000000c0)) tkill(r1, 0x1104400000016) 07:48:49 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000001d40)=[{&(0x7f0000001ac0)="be657b9369aa2d917c869d7828b0efcecd4b6122358a03fcc0a29ab59b4343fa368015e015322318c53c8e027b909b2fbf", 0x2ed}, {&(0x7f0000001b00)="8a09d12ee6f09b9ccf0a556d63d08a28d98a258831b7d524763125c8da22845447faa72706f3df7a6152ec1b563c245a7ec68cca1855244ea9a997613e5e94a6a4c221366d32020f9dee6cc7d1e1c03e4f800f57a9c4eb88803be79fb5885490964245f8d85575c39c719fa8aad18d3572de84903b9a272b69f43d212be3bb763d30f8c322ca81d9f71ca71b62b8ca5c5a5519a6451a40723876d44636978339fa4d73f72d5786819d700231026b759da38e55f0c8ad30abb5ca7c479c984d59d949941cf9298153cc8ade4dab"}, {&(0x7f0000001c00)="b07c88f858447499aa27aea015cee210fb731abbf2f7602e1032940a75e7cdef9488a543bd2086eef6f0cbc10bb79f67e27a0817534ff9dbc54860de3138a1e2db0b43ec26a9a306b83d85410234c9de95c9ed6b42392bc2e403407a7d353d31cf60f5d8ff073505f711d9f730dc"}, {&(0x7f0000001c80)="88029203dc9ea207cee98ebcf35c4ded5b4d250e36a1e0a5b168d2c766f8aed7b1d570885acc4dcb1866bae71bd87e9596badba8a7e180f41690e998abebc19e32d391f701b6b02840d9999f04e708cddb8f38fa08731e439463f7d5d20271a227c08f22c37cad1d3fff3fcfff3e59cb15c797fb4ffbca1fb41933b5cf1c624f70cceb42920307f80077cb9bffcafddd74aa1508dcd3c0ddd45d8c"}], 0x0, 0x0, 0x326}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000100)=0xe8) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000540)=0x0, &(0x7f0000000580), &(0x7f00000005c0)=0x0) mount$bpf(0x0, &(0x7f0000001840)='./file0\x00', &(0x7f0000001880)='bpf\x00', 0x800000, &(0x7f00000018c0)={[{@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x10000}}, {@mode={'mode', 0x3d, 0x1f82}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x3f}}, {@mode={'mode', 0x3d, 0xffffffffffffff01}}], [{@smackfsfloor={'smackfsfloor', 0x3d, '\\-cgroup(wlan0,$eth0'}}, {@dont_measure='dont_measure'}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@hash='hash'}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@uid_lt={'uid<', r3}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@smackfsdef={'smackfsdef', 0x3d, 'vboxnet1trustedvboxnet1'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@uid_lt={'uid<', r3}}]}) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x401, 0x3, &(0x7f0000000300)=[{&(0x7f00000006c0)="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", 0x1000, 0x2}, {&(0x7f0000000180)="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", 0xfa, 0x9}, {&(0x7f0000000280)="3c2c75abfb74ad5252ce752b7c8a03ce0d9bcfcf3ff94cc50b1de40f7d95680a708d607ad9909809e31aa719828d72521a3fc15fe4534055877d10811e520264d5f43b8a", 0x44, 0xc2b}], 0x200f0a4, &(0x7f0000001740)={[{@suiddir='suiddir'}, {@quota_on='quota=on'}], [{@subj_type={'subj_type', 0x3d, 'vboxnet0'}}, {@fowner_lt={'fowner<', r1}}, {@fowner_lt={'fowner<', r2}}, {@uid_eq={'uid', 0x3d, r4}}, {@audit='audit'}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@obj_type={'obj_type', 0x3d, '}%['}}, {@uid_eq={'uid', 0x3d, r5}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@obj_user={'obj_user', 0x3d, '\\-cgroup(wlan0,$eth0'}}]}) 07:48:49 executing program 2: clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xff, 0x8000) r2 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x2710, @host}, 0x10, 0x80000) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x50}) modify_ldt$read_default(0x2, &(0x7f0000000140)=""/241, 0xf1) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x1f, r0, 0x0, 0x0) 07:48:49 executing program 5: ioctl$VHOST_GET_FEATURES(0xffffffffffffffff, 0x80044dff, &(0x7f00000001c0)) 07:48:49 executing program 1: ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)='tunl0\x00') stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)) getcwd(&(0x7f0000000ac0)=""/4096, 0x1000) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x20, 0x20000) sendto(r1, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x769) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000980)="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", 0x10d) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200)={0xffffffffffffffff}, 0x117, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x10000, @ipv4={[], [], @multicast1}, 0x4}, {0xa, 0x4e23, 0x101, @loopback, 0x3ff}, r2, 0x4}}, 0x48) r3 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, &(0x7f0000000140)="bf288f885d8a1d787a5a1457f7575fcad426660d2b027109824ff6513a914e2d280cf5031342d1", 0x27, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x802, 0x0) keyctl$assume_authority(0x10, r3) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) dup(0xffffffffffffffff) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, 0x0) r4 = gettid() sched_setparam(r4, 0x0) [ 244.866836] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 07:48:50 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0xffffffffffffffff, @ib={0x1b, 0x0, 0x0, {"2fb62ead497f5a31e067faacbc31c76f"}}}}, 0x90) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x1, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f00000001c0)=r1) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x106, 0x5}}, 0x20) io_setup(0x10000000, &(0x7f0000000280)=0x0) io_cancel(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x7, 0x2, r0, &(0x7f00000002c0)="26acb3e01d9e46553f615e670b476b2cac717c1e92e950f081c803b4d46193dcc19e196969bbc4000eef7e82215058f1065a147415883808e794f78f49f760c039ad1bd0c44acaa35420a8161d7411bc8b59005978cac8cac266278cfe807e0e499ad156275d0ea12d5bb34cec6d17ae94b6e3e4896c0c116a4f100e8b7e4d3648ae6ba42d1a23499ed0561930df4a20dde5e3b30a449e6db912648465d4f0dfe3413d6cfa3327c548a4d532eba53d6ff309e2ac2a13bf3341c888aa55d3cd5aa36126767f3a1b0dfd8aa5e20945976d5dda5c0ffa6070ca95521bcf11a79f648756a8aad8", 0xe5, 0x7ff, 0x0, 0x0, r1}, &(0x7f0000000400)) r3 = syz_open_dev$ndb(&(0x7f0000000200)='/dev/nbd#\x00', 0x0, 0x20000) fcntl$getownex(r3, 0x10, &(0x7f0000000240)) 07:48:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_UNALIGN(0x6, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000440)={0x20000000000001, 0x0, @pic={0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x3}}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) r4 = dup3(r1, 0xffffffffffffffff, 0x80000) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e21, 0x3615, @dev={0xfe, 0x80, [], 0x10}, 0x7}}}, &(0x7f0000000000)=0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000140)={r5, 0x8000}, &(0x7f00000001c0)=0x8) ioctl$KVM_RUN(r3, 0xae80, 0x0) 07:48:50 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = inotify_init1(0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x2}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000100)={r3, 0x8}, 0x8) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r4, 0x0, 0x0) ptrace(0x4207, r4) ptrace$getregset(0x4203, r4, 0x0, &(0x7f0000000000)={&(0x7f0000002280)=""/4096, 0x68}) 07:48:50 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440)='security.selinux\x00', &(0x7f0000000540)='system_u:object_r:man_t:s0\x00', 0x1b, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000600)={0x7f, 0xa1d, 0x8, 0x1, 0x2, 0x10000, 0x0, 0x1c, 0x7fff, 0x8, 0x9, 0x101}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x704b, &(0x7f0000000640)=ANY=[]) r2 = msgget(0x3, 0x208) r3 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x7, 0x109000) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000640), &(0x7f0000000580)=0x4) msgsnd(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="130000000000000096dfde599e3a629346d5cfc2e60a01a2e0b1c127d6bcb2fe5499ea387fb3347d503363ca4f522ea0276413adde6ee6f0f8e4951efee4f4bf923ff2d84bae2dab03dfd1772a37a529908fc7cfc3a1e11d9df27616889584811367cbbccfeb82cfe66d04b4b1ae12188e297c98b6e0120d81b4d119b540f321a6"], 0x89, 0x800) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000540), 0x820, &(0x7f00000005c0)=ANY=[@ANYBLOB="00020000000000000000"]) syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file1\x00', 0x6f, 0x0, &(0x7f00000001c0), 0x112000, &(0x7f0000000340)={[{@type={'type', 0x3d, "0b600558"}}, {@file_umask={'file_umask', 0x3d, 0x5}}, {@dir_umask={'dir_umask', 0x3d, 0x1}}, {@session={'session', 0x3d, 0xfffffffffffffffe}}, {@file_umask={'file_umask', 0x3d, 0x3ff}}], [{@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@xdp, &(0x7f0000000300)=0x39) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffff9c}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xfffffffffffffe8e) [ 245.009913] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 07:48:50 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00', "737978310000000000000000000000000000000200000057310f00000000000000000000000000170000220000000000000000000000000000000000001400", 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x11c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x10000000000000) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/snapshot\x00', 0x80001, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x10000, 0x1) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000040)=0xaaf, 0x4) poll(&(0x7f0000000080)=[{r1, 0x400}, {r0, 0x8248}, {r2, 0x1040}, {r2}, {0xffffffffffffffff, 0xa000}, {r2, 0x1}, {0xffffffffffffffff, 0x2000}, {r1}, {r1, 0x403}], 0x9, 0x1f) [ 245.202297] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 245.231106] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 245.297662] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 245.330780] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 245.363860] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 245.390759] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 245.405450] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 245.413086] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 245.421254] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 245.428112] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 245.435327] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 245.442443] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 245.452699] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syx1 [ 245.559035] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 248.078603] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 251.088586] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 254.098606] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 257.108584] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 260.118583] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 263.128631] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 266.138611] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 269.148584] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 272.158602] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 275.168588] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 278.178586] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 281.188615] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 284.198589] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 287.208595] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 290.218585] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 293.228623] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 296.238593] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 299.248585] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 302.258589] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 305.268586] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 308.278599] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 311.288588] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 314.298593] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 317.309069] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 320.318592] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 323.328597] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 326.338585] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 329.348585] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 332.358598] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 335.368596] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 338.378594] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 341.388597] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 344.398584] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 347.408597] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 350.418601] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 353.428584] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 356.438586] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 359.448596] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 362.458585] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 365.468592] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 368.478667] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 371.488591] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 374.498586] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 377.508590] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 380.518598] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 383.528590] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 386.538595] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 389.548589] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 391.118727] INFO: task syz-executor0:7831 blocked for more than 140 seconds. [ 391.125955] Not tainted 4.20.0-rc1-next-20181109+ #110 [ 391.132080] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 391.140294] syz-executor0 D24560 7831 5939 0x00000004 [ 391.145927] Call Trace: [ 391.148582] __schedule+0x8cf/0x21d0 [ 391.157704] ? prepare_to_wait_event+0x39f/0xa10 [ 391.162776] ? __sched_text_start+0x8/0x8 [ 391.166978] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 391.172374] ? prepare_to_wait_event+0x39f/0xa10 [ 391.177141] ? prepare_to_wait_exclusive+0x480/0x480 [ 391.182617] ? __lock_is_held+0xb5/0x140 [ 391.186818] schedule+0xef/0x370 [ 391.190519] ? __schedule+0x21d0/0x21d0 [ 391.194539] ? wakeup_dirtytime_writeback+0x5e0/0x5e0 [ 391.200139] ? replenish_dl_entity.cold.55+0x36/0x36 [ 391.205280] ? __might_sleep+0x95/0x190 [ 391.209561] wb_wait_for_completion+0x1f9/0x2d0 [ 391.214246] ? block_dump___mark_inode_dirty+0x120/0x120 [ 391.220066] ? finish_wait+0x430/0x430 [ 391.223984] ? lock_acquire+0x1ed/0x520 [ 391.227971] sync_inodes_sb+0x33e/0x480 [ 391.232245] ? try_to_writeback_inodes_sb+0x70/0x70 [ 391.237293] ? iterate_supers+0xda/0x290 [ 391.241629] ? lock_downgrade+0x900/0x900 [ 391.245796] ? down_read+0x8d/0x120 [ 391.249728] ? __down_interruptible+0x700/0x700 [ 391.254407] sync_inodes_one_sb+0x59/0x70 [ 391.258558] iterate_supers+0x149/0x290 [ 391.262811] ? __ia32_sys_tee+0x2b0/0x2b0 [ 391.266972] ksys_sync+0xec/0x1e0 [ 391.270715] ? sync_filesystem+0x330/0x330 [ 391.274994] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 391.280807] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 391.286217] ? trace_hardirqs_off_caller+0x300/0x300 [ 391.291589] __ia32_sys_sync+0xe/0x20 [ 391.295422] do_syscall_64+0x1b9/0x820 [ 391.299614] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 391.304979] ? syscall_return_slowpath+0x5e0/0x5e0 [ 391.310184] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 391.315035] ? trace_hardirqs_on_caller+0x310/0x310 [ 391.320328] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 391.325346] ? prepare_exit_to_usermode+0x291/0x3b0 [ 391.330647] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 391.335506] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 391.340928] RIP: 0033:0x457569 [ 391.344142] Code: Bad RIP value. [ 391.347503] RSP: 002b:00007efd962b8c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a2 [ 391.355494] RAX: ffffffffffffffda RBX: 000000000072bfa8 RCX: 0000000000457569 [ 391.363214] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 391.370730] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 391.378002] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efd962b96d4 [ 391.385537] R13: 00000000004c3216 R14: 00000000004d8c98 R15: 00000000ffffffff [ 391.393076] INFO: task syz-executor0:7896 blocked for more than 140 seconds. [ 391.400545] Not tainted 4.20.0-rc1-next-20181109+ #110 [ 391.406337] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 391.414541] syz-executor0 D25280 7896 5939 0x00000004 [ 391.420424] Call Trace: [ 391.423017] __schedule+0x8cf/0x21d0 [ 391.426732] ? prepare_to_wait_event+0x39f/0xa10 [ 391.431764] ? __sched_text_start+0x8/0x8 [ 391.435925] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 391.441415] ? prepare_to_wait_event+0x39f/0xa10 [ 391.446189] ? prepare_to_wait_exclusive+0x480/0x480 [ 391.451556] ? __lock_is_held+0xb5/0x140 [ 391.455631] schedule+0xef/0x370 [ 391.459365] ? __schedule+0x21d0/0x21d0 [ 391.463348] ? wakeup_dirtytime_writeback+0x5e0/0x5e0 [ 391.468881] ? graph_lock+0x270/0x270 [ 391.472686] ? replenish_dl_entity.cold.55+0x36/0x36 [ 391.477791] ? __might_sleep+0x95/0x190 [ 391.482066] wb_wait_for_completion+0x1f9/0x2d0 [ 391.486748] ? block_dump___mark_inode_dirty+0x120/0x120 [ 391.492455] ? finish_wait+0x430/0x430 [ 391.496347] ? find_held_lock+0x36/0x1c0 [ 391.500675] ? lock_acquire+0x1ed/0x520 [ 391.504657] sync_inodes_sb+0x33e/0x480 [ 391.508865] ? try_to_writeback_inodes_sb+0x70/0x70 [ 391.513881] ? iterate_supers+0xda/0x290 [ 391.517948] ? lock_downgrade+0x900/0x900 [ 391.522411] ? down_read+0x8d/0x120 [ 391.526046] ? __down_interruptible+0x700/0x700 [ 391.530998] sync_inodes_one_sb+0x59/0x70 [ 391.535149] iterate_supers+0x149/0x290 [ 391.539399] ? __ia32_sys_tee+0x2b0/0x2b0 [ 391.543557] ksys_sync+0xec/0x1e0 [ 391.547010] ? sync_filesystem+0x330/0x330 [ 391.551538] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 391.557094] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 391.562729] ? trace_hardirqs_off_caller+0x300/0x300 [ 391.567845] __ia32_sys_sync+0xe/0x20 [ 391.571895] do_syscall_64+0x1b9/0x820 [ 391.575794] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 391.581440] ? syscall_return_slowpath+0x5e0/0x5e0 [ 391.586373] ? trace_hardirqs_on_caller+0x310/0x310 [ 391.591645] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 391.596733] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 391.604206] ? __switch_to_asm+0x40/0x70 [ 391.608276] ? __switch_to_asm+0x34/0x70 [ 391.612700] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 391.617575] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 391.623032] RIP: 0033:0x457569 [ 391.626237] Code: Bad RIP value. [ 391.629871] RSP: 002b:00007efd96296c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a2 [ 391.637578] RAX: ffffffffffffffda RBX: 000000000072c048 RCX: 0000000000457569 [ 391.645121] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 391.652630] RBP: 000000000072c040 R08: 0000000000000000 R09: 0000000000000000 [ 391.660150] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efd962976d4 [ 391.667419] R13: 00000000004c3216 R14: 00000000004d8c98 R15: 00000000ffffffff [ 391.675071] [ 391.675071] Showing all locks held in the system: [ 391.681845] 4 locks held by kworker/u4:0/7: [ 391.686175] 1 lock held by khungtaskd/1011: [ 391.690821] #0: 00000000adb01b4a (rcu_read_lock){....}, at: debug_show_all_locks+0xd0/0x424 [ 391.699715] 1 lock held by rsyslogd/5810: [ 391.703855] #0: 00000000e066cb41 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1bb/0x200 [ 391.712138] 2 locks held by getty/5900: [ 391.716103] #0: 00000000052c5a39 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 391.724621] #1: 0000000082f22608 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 391.733784] 2 locks held by getty/5901: [ 391.737748] #0: 000000006da4ea48 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 391.746273] #1: 00000000e5be17af (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 391.755386] 2 locks held by getty/5902: [ 391.759585] #0: 00000000649e6cb6 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 391.767829] #1: 000000005f276664 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 391.776942] 2 locks held by getty/5903: [ 391.781158] #0: 000000009127cd9d (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 391.789639] #1: 00000000e81d450c (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 391.798495] 2 locks held by getty/5904: [ 391.802750] #0: 0000000045c3923b (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 391.811244] #1: 0000000071c9cc73 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 391.820340] 2 locks held by getty/5905: [ 391.824308] #0: 00000000d1d52c53 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 391.832794] #1: 00000000d9c93c4c (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 391.841923] 2 locks held by getty/5906: [ 391.845888] #0: 0000000075218c73 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 391.854424] #1: 000000007c1c1449 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 391.863528] 1 lock held by syz-executor0/7831: [ 391.868113] #0: 000000008f01ec5e (&fc->fs_type->s_umount_key#62){.+.+}, at: iterate_supers+0xe2/0x290 [ 391.877914] 1 lock held by syz-executor0/7896: [ 391.882705] #0: 000000008f01ec5e (&fc->fs_type->s_umount_key#62){.+.+}, at: iterate_supers+0xe2/0x290 [ 391.892431] [ 391.894062] ============================================= [ 391.894062] [ 391.901343] NMI backtrace for cpu 0 [ 391.904972] CPU: 0 PID: 1011 Comm: khungtaskd Not tainted 4.20.0-rc1-next-20181109+ #110 [ 391.913196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 391.922539] Call Trace: [ 391.925174] dump_stack+0x244/0x39d [ 391.928803] ? dump_stack_print_info.cold.1+0x20/0x20 [ 391.934021] ? check_preemption_disabled+0x48/0x280 [ 391.939051] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 391.944594] nmi_cpu_backtrace.cold.2+0x5c/0xa1 [ 391.949303] ? lapic_can_unplug_cpu.cold.27+0x3f/0x3f [ 391.954492] nmi_trigger_cpumask_backtrace+0x1e8/0x22a [ 391.959774] arch_trigger_cpumask_backtrace+0x14/0x20 [ 391.964963] watchdog+0xb4c/0x1060 [ 391.968512] ? hungtask_pm_notify+0xb0/0xb0 [ 391.972857] ? __kthread_parkme+0xce/0x1a0 [ 391.977101] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 391.982206] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 391.987308] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 391.991896] ? trace_hardirqs_on+0xbd/0x310 [ 391.996256] ? kasan_check_read+0x11/0x20 [ 392.000401] ? __kthread_parkme+0xce/0x1a0 [ 392.004637] ? trace_hardirqs_off_caller+0x300/0x300 [ 392.009742] ? __schedule+0x21d0/0x21d0 [ 392.013714] ? lockdep_init_map+0x9/0x10 [ 392.017780] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 392.022904] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 392.028440] ? __kthread_parkme+0xfb/0x1a0 [ 392.032677] ? hungtask_pm_notify+0xb0/0xb0 [ 392.037000] kthread+0x35a/0x440 [ 392.040370] ? kthread_stop+0x8f0/0x8f0 [ 392.044349] ret_from_fork+0x3a/0x50 [ 392.048167] Sending NMI from CPU 0 to CPUs 1: [ 392.055184] INFO: NMI handler (nmi_cpu_backtrace_handler) took too long to run: 2.248 msecs [ 392.055706] NMI backtrace for cpu 1 [ 392.055713] CPU: 1 PID: 7 Comm: kworker/u4:0 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 392.055720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 392.055724] Workqueue: writeback wb_workfn (flush-7:0) [ 392.055733] RIP: 0010:write_comp_data+0x4/0x70 [ 392.055756] Code: 00 e9 a6 fc ff ff 4c 89 f7 e8 88 58 43 00 e9 6f fc ff ff e8 1e 38 c9 ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 55 48 89 e5 <65> 4c 8b 04 25 40 ee 01 00 65 8b 05 7c 45 82 7e a9 00 01 1f 00 75 [ 392.055761] RSP: 0018:ffff8801d9ae5970 EFLAGS: 00000246 [ 392.055768] RAX: 0000000000000000 RBX: ffff8801d9ae5bb0 RCX: ffffffff87cb45c0 [ 392.055773] RDX: 0000000000000001 RSI: 000000000000003f RDI: 0000000000000007 [ 392.055778] RBP: ffff8801d9ae5970 R08: ffff8801d9ada1c0 R09: ffffed003b5e5b67 [ 392.055784] R10: ffffed003b5e5b67 R11: ffff8801daf2db3b R12: 1ffff1003b35cb34 [ 392.055789] R13: 0000000000000001 R14: ffff8801b6858c82 R15: ffff8801d9ae5bc8 [ 392.055794] FS: 0000000000000000(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 392.055798] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 392.055804] CR2: ffffffffff600400 CR3: 00000001c2868000 CR4: 00000000001406e0 [ 392.055809] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 392.055814] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 392.055817] Call Trace: [ 392.055821] __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 392.055825] xas_start+0x3a0/0x740 [ 392.055828] ? xas_pause+0x490/0x490 [ 392.055831] ? lock_acquire+0x1ed/0x520 [ 392.055835] ? find_get_entry+0x2e3/0x1120 [ 392.055839] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.055843] ? check_preemption_disabled+0x48/0x280 [ 392.055847] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 392.055851] ? check_preemption_disabled+0x48/0x280 [ 392.055855] ? rcu_softirq_qs+0x20/0x20 [ 392.055858] xas_load+0x21/0x1e0 [ 392.055861] find_get_entry+0x3ca/0x1120 [ 392.055865] ? find_held_lock+0x36/0x1c0 [ 392.055869] ? mark_page_accessed+0xcaf/0x2040 [ 392.055873] ? filemap_map_pages+0x1a20/0x1a20 [ 392.055876] ? find_get_entry+0xa87/0x1120 [ 392.055880] ? lock_downgrade+0x900/0x900 [ 392.055892] ? check_preemption_disabled+0x48/0x280 [ 392.055895] ? kasan_check_read+0x11/0x20 [ 392.055899] ? rcu_read_unlock_special+0x370/0x370 [ 392.055903] ? find_get_entry+0xaae/0x1120 [ 392.055907] ? filemap_map_pages+0x1a20/0x1a20 [ 392.055910] ? mark_held_locks+0xc7/0x130 [ 392.055915] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 392.055918] ? retint_kernel+0x2d/0x2d [ 392.055922] ? graph_lock+0x270/0x270 [ 392.055926] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 392.055929] pagecache_get_page+0x12f/0xf00 [ 392.055933] ? add_to_page_cache_lru+0xdb0/0xdb0 [ 392.055937] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 392.055941] ? print_usage_bug+0xc0/0xc0 [ 392.055945] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 392.055948] ? __might_sleep+0x95/0x190 [ 392.055952] ? pagecache_get_page+0x2d8/0xf00 [ 392.055955] ? mark_held_locks+0xc7/0x130 [ 392.055959] ? lock_downgrade+0x900/0x900 [ 392.055963] ? __find_get_block+0x2f7/0xf10 [ 392.055966] ? __find_get_block+0x2f7/0xf10 [ 392.055970] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 392.055974] ? trace_hardirqs_on+0xbd/0x310 [ 392.055978] ? __getblk_gfp+0x3d3/0x1030 [ 392.055981] ? trace_hardirqs_off_caller+0x300/0x300 [ 392.055986] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 392.055990] ? check_preemption_disabled+0x48/0x280 [ 392.055994] __find_get_block+0x635/0xf10 [ 392.055997] ? try_to_free_buffers+0xd40/0xd40 [ 392.056002] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 392.056005] ? unlock_page+0x2c2/0x4c0 [ 392.056009] ? wake_up_page_bit+0x6f0/0x6f0 [ 392.056013] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 392.056017] ? init_page_buffers+0x433/0x570 [ 392.056021] ? __set_page_dirty_buffers+0x810/0x810 [ 392.056024] ? __getblk_gfp+0x56a/0x1030 [ 392.056028] ? __getblk_gfp+0x579/0x1030 [ 392.056031] __getblk_gfp+0x3d3/0x1030 [ 392.056039] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.056043] ? __find_get_block+0xf10/0xf10 [ 392.056046] ? mark_held_locks+0x130/0x130 [ 392.056050] ? graph_lock+0x270/0x270 [ 392.056053] ? graph_lock+0x270/0x270 [ 392.056056] ? check_usage+0x1aa/0x790 [ 392.056060] ? __save_stack_trace+0x7d/0xf0 [ 392.056064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.056068] ? check_preemption_disabled+0x48/0x280 [ 392.056072] ? find_held_lock+0x36/0x1c0 [ 392.056075] ? lock_downgrade+0x900/0x900 [ 392.056079] ? graph_lock+0x270/0x270 [ 392.056082] ? submit_bio+0xba/0x460 [ 392.056086] __bread_gfp+0x2d/0x310 [ 392.056089] __fat_write_inode+0x347/0xb60 [ 392.056093] ? graph_lock+0x270/0x270 [ 392.056096] ? fat_calc_dir_size+0x2a0/0x2a0 [ 392.056101] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.056105] ? check_preemption_disabled+0x48/0x280 [ 392.056108] fat_write_inode+0x97/0x180 [ 392.056130] __writeback_single_inode+0xf4a/0x1650 [ 392.056134] ? __mark_inode_dirty+0x1500/0x1500 [ 392.056138] ? find_held_lock+0x36/0x1c0 [ 392.056142] ? find_held_lock+0x36/0x1c0 [ 392.056146] ? wbc_attach_and_unlock_inode+0x670/0xa30 [ 392.056150] ? lock_downgrade+0x900/0x900 [ 392.056154] ? find_held_lock+0x13f/0x1c0 [ 392.056158] ? kasan_check_read+0x11/0x20 [ 392.056162] ? do_raw_spin_unlock+0xa7/0x330 [ 392.056166] ? do_raw_spin_trylock+0x270/0x270 [ 392.056170] ? lock_downgrade+0x900/0x900 [ 392.056174] ? _raw_spin_unlock+0x2c/0x50 [ 392.056178] ? wbc_attach_and_unlock_inode+0x675/0xa30 [ 392.056182] ? do_raw_spin_trylock+0x270/0x270 [ 392.056187] ? __writeback_single_inode+0x1650/0x1650 [ 392.056191] writeback_sb_inodes+0x71f/0x1210 [ 392.056206] ? wbc_detach_inode+0x940/0x940 [ 392.056209] ? lock_release+0xa10/0xa10 [ 392.056213] ? down_read_trylock+0xda/0x140 [ 392.056217] ? trylock_super+0x22/0x110 [ 392.056220] ? downgrade_write+0x270/0x270 [ 392.056223] ? queue_io+0x3d8/0x800 [ 392.056228] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 392.056232] __writeback_inodes_wb+0x1b9/0x340 [ 392.056236] ? writeback_sb_inodes+0x1210/0x1210 [ 392.056239] ? __lock_is_held+0xb5/0x140 [ 392.056243] wb_writeback+0xa5d/0xfa0 [ 392.056247] ? writeback_inodes_wb.constprop.50+0x320/0x320 [ 392.056251] ? set_precision+0xe0/0xe0 [ 392.056255] ? __lock_acquire+0x62f/0x4c20 [ 392.056259] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 392.056262] ? print_usage_bug+0xc0/0xc0 [ 392.056266] ? string+0x225/0x2d0 [ 392.056269] ? widen_string+0x2e0/0x2e0 [ 392.056273] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 392.056277] ? find_next_bit+0x104/0x130 [ 392.056281] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 392.056284] ? find_next_bit+0x104/0x130 [ 392.056288] ? cpumask_next+0x41/0x50 [ 392.056292] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 392.056296] ? get_nr_dirty_inodes+0xd6/0x130 [ 392.056300] ? __local_bh_enable_ip+0x160/0x260 [ 392.056303] ? get_nr_dirty_pages+0x17c/0x1f0 [ 392.056307] ? _raw_spin_unlock_bh+0x30/0x40 [ 392.056311] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 392.056316] ? wb_split_bdi_pages.isra.33+0x134/0x1b0 [ 392.056319] ? wb_wait_for_completion+0x2d0/0x2d0 [ 392.056323] ? wb_workfn+0x51c/0x1780 [ 392.056327] ? __local_bh_enable_ip+0x160/0x260 [ 392.056330] wb_workfn+0xedf/0x1780 [ 392.056334] ? __lock_acquire+0x62f/0x4c20 [ 392.056338] ? inode_wait_for_writeback+0x40/0x40 [ 392.056341] ? mark_held_locks+0x130/0x130 [ 392.056345] ? lock_downgrade+0x900/0x900 [ 392.056349] ? lock_downgrade+0x900/0x900 [ 392.056352] ? trace_hardirqs_off+0xb8/0x310 [ 392.056356] ? kasan_check_read+0x11/0x20 [ 392.056360] ? do_raw_spin_unlock+0xa7/0x330 [ 392.056363] ? trace_hardirqs_on+0x310/0x310 [ 392.056367] ? do_raw_spin_trylock+0x270/0x270 [ 392.056371] ? lock_pin_lock+0x350/0x350 [ 392.056375] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 392.056378] ? try_to_wake_up+0x11c/0x1490 [ 392.056383] ? __perf_event_task_sched_out+0x33a/0x1ca0 [ 392.056386] ? graph_lock+0x270/0x270 [ 392.056390] ? debug_object_deactivate+0x2eb/0x450 [ 392.056394] ? lock_downgrade+0x900/0x900 [ 392.056397] ? find_held_lock+0x36/0x1c0 [ 392.056401] ? graph_lock+0x270/0x270 [ 392.056405] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.056409] ? check_preemption_disabled+0x48/0x280 [ 392.056413] ? __lock_is_held+0xb5/0x140 [ 392.056416] process_one_work+0xc8b/0x1c40 [ 392.056420] ? mark_held_locks+0x130/0x130 [ 392.056424] ? pwq_dec_nr_in_flight+0x4a0/0x4a0 [ 392.056427] ? __switch_to_asm+0x34/0x70 [ 392.056431] ? __switch_to_asm+0x34/0x70 [ 392.056435] ? __switch_to_asm+0x40/0x70 [ 392.056438] ? __switch_to_asm+0x34/0x70 [ 392.056442] ? __switch_to_asm+0x40/0x70 [ 392.056445] ? __switch_to_asm+0x34/0x70 [ 392.056449] ? __switch_to_asm+0x34/0x70 [ 392.056452] ? __switch_to_asm+0x40/0x70 [ 392.056456] ? __switch_to_asm+0x34/0x70 [ 392.056460] ? __switch_to_asm+0x40/0x70 [ 392.056463] ? __switch_to_asm+0x34/0x70 [ 392.056467] ? __switch_to_asm+0x40/0x70 [ 392.056470] ? __switch_to_asm+0x34/0x70 [ 392.056474] ? __sched_text_start+0x8/0x8 [ 392.056477] ? graph_lock+0x270/0x270 [ 392.056481] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 392.056484] ? native_iret+0x7/0x7 [ 392.056488] ? error_exit+0xb/0x20 [ 392.056491] ? find_held_lock+0x36/0x1c0 [ 392.056495] ? lock_acquire+0x1ed/0x520 [ 392.056499] ? worker_thread+0x3e0/0x1390 [ 392.056502] ? kasan_check_write+0x14/0x20 [ 392.056506] ? do_raw_spin_lock+0x14f/0x350 [ 392.056509] ? __schedule+0x21d0/0x21d0 [ 392.056513] ? rwlock_bug.part.2+0x90/0x90 [ 392.056517] ? trace_hardirqs_on+0x310/0x310 [ 392.056521] worker_thread+0x17f/0x1390 [ 392.056525] ? preempt_notifier_register+0x200/0x200 [ 392.056528] ? process_one_work+0x1c40/0x1c40 [ 392.056532] ? __schedule+0x8d7/0x21d0 [ 392.056536] ? __sched_text_start+0x8/0x8 [ 392.056539] ? __sched_text_start+0x8/0x8 [ 392.056543] ? __kthread_parkme+0xce/0x1a0 [ 392.056547] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 392.056551] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 392.056555] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 392.056558] ? trace_hardirqs_on+0xbd/0x310 [ 392.056562] ? kasan_check_read+0x11/0x20 [ 392.056566] ? __kthread_parkme+0xce/0x1a0 [ 392.056570] ? trace_hardirqs_off_caller+0x300/0x300 [ 392.056573] ? __schedule+0x21d0/0x21d0 [ 392.056577] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 392.056582] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 392.056585] ? __kthread_parkme+0xfb/0x1a0 [ 392.056589] ? process_one_work+0x1c40/0x1c40 [ 392.056592] kthread+0x35a/0x440 [ 392.056596] ? kthread_stop+0x8f0/0x8f0 [ 392.056599] ret_from_fork+0x3a/0x50 [ 392.066106] Kernel panic - not syncing: hung_task: blocked tasks [ 392.559143] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0 [ 392.560376] CPU: 0 PID: 1011 Comm: khungtaskd Not tainted 4.20.0-rc1-next-20181109+ #110 [ 393.081750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 393.091161] Call Trace: [ 393.093752] dump_stack+0x244/0x39d [ 393.097380] ? dump_stack_print_info.cold.1+0x20/0x20 [ 393.102627] panic+0x2ad/0x55c [ 393.105821] ? add_taint.cold.5+0x16/0x16 [ 393.109971] ? nmi_trigger_cpumask_backtrace+0x1c8/0x22a [ 393.115417] ? nmi_trigger_cpumask_backtrace+0x1f9/0x22a [ 393.120861] ? nmi_trigger_cpumask_backtrace+0x1d1/0x22a [ 393.126310] ? nmi_trigger_cpumask_backtrace+0x1c8/0x22a [ 393.131761] watchdog+0xb5d/0x1060 [ 393.135313] ? hungtask_pm_notify+0xb0/0xb0 [ 393.139637] ? __kthread_parkme+0xce/0x1a0 [ 393.143877] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 393.148979] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 393.154086] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 393.158669] ? trace_hardirqs_on+0xbd/0x310 [ 393.162989] ? kasan_check_read+0x11/0x20 [ 393.167139] ? __kthread_parkme+0xce/0x1a0 [ 393.171378] ? trace_hardirqs_off_caller+0x300/0x300 [ 393.176480] ? __schedule+0x21d0/0x21d0 [ 393.180452] ? lockdep_init_map+0x9/0x10 [ 393.184524] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 393.189631] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 393.195166] ? __kthread_parkme+0xfb/0x1a0 [ 393.199404] ? hungtask_pm_notify+0xb0/0xb0 [ 393.203724] kthread+0x35a/0x440 [ 393.207096] ? kthread_stop+0x8f0/0x8f0 [ 393.211074] ret_from_fork+0x3a/0x50 [ 393.216117] Kernel Offset: disabled [ 393.219741] Rebooting in 86400 seconds..