[info] Using makefile-style concurrent boot in runlevel 2.
[   24.376684] audit: type=1800 audit(1543736709.527:21): pid=5771 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2419 res=0
[   24.405061] audit: type=1800 audit(1543736709.537:22): pid=5771 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2447 res=0
[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c.
[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c.
[....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c.

Debian GNU/Linux 7 syzkaller ttyS0

Warning: Permanently added '10.128.0.82' (ECDSA) to the list of known hosts.
2018/12/02 07:45:21 fuzzer started
2018/12/02 07:45:23 dialing manager at 10.128.0.26:39025
2018/12/02 07:45:23 syscalls: 1
2018/12/02 07:45:23 code coverage: enabled
2018/12/02 07:45:23 comparison tracing: enabled
2018/12/02 07:45:23 setuid sandbox: enabled
2018/12/02 07:45:23 namespace sandbox: enabled
2018/12/02 07:45:23 Android sandbox: /sys/fs/selinux/policy does not exist
2018/12/02 07:45:23 fault injection: enabled
2018/12/02 07:45:23 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled
2018/12/02 07:45:23 net packet injection: enabled
2018/12/02 07:45:23 net device setup: enabled
07:48:29 executing program 0:

syzkaller login: [  223.994210] IPVS: ftp: loaded support on port[0] = 21
07:48:29 executing program 1:

[  224.258078] IPVS: ftp: loaded support on port[0] = 21
07:48:29 executing program 2:

[  224.572611] IPVS: ftp: loaded support on port[0] = 21
07:48:29 executing program 3:

[  224.970014] IPVS: ftp: loaded support on port[0] = 21
07:48:30 executing program 4:

[  225.278059] bridge0: port 1(bridge_slave_0) entered blocking state
[  225.293493] bridge0: port 1(bridge_slave_0) entered disabled state
[  225.308187] device bridge_slave_0 entered promiscuous mode
[  225.422337] bridge0: port 2(bridge_slave_1) entered blocking state
[  225.435821] bridge0: port 2(bridge_slave_1) entered disabled state
[  225.449682] device bridge_slave_1 entered promiscuous mode
[  225.537342] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  225.577947] IPVS: ftp: loaded support on port[0] = 21
[  225.708478] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
07:48:31 executing program 5:

[  226.137155] IPVS: ftp: loaded support on port[0] = 21
[  226.160384] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  226.190086] bridge0: port 1(bridge_slave_0) entered blocking state
[  226.198844] bridge0: port 1(bridge_slave_0) entered disabled state
[  226.211193] device bridge_slave_0 entered promiscuous mode
[  226.300967] bridge0: port 2(bridge_slave_1) entered blocking state
[  226.308327] bridge0: port 2(bridge_slave_1) entered disabled state
[  226.316136] device bridge_slave_1 entered promiscuous mode
[  226.326885] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  226.382468] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  226.469445] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  226.504970] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[  226.522201] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  226.596436] bridge0: port 1(bridge_slave_0) entered blocking state
[  226.610808] bridge0: port 1(bridge_slave_0) entered disabled state
[  226.618131] device bridge_slave_0 entered promiscuous mode
[  226.685348] bridge0: port 2(bridge_slave_1) entered blocking state
[  226.713729] bridge0: port 2(bridge_slave_1) entered disabled state
[  226.730531] device bridge_slave_1 entered promiscuous mode
[  226.870043] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  226.914374] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  226.966156] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  226.994049] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  227.009932] team0: Port device team_slave_0 added
[  227.056003] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  227.076946] bridge0: port 1(bridge_slave_0) entered blocking state
[  227.087962] bridge0: port 1(bridge_slave_0) entered disabled state
[  227.101634] device bridge_slave_0 entered promiscuous mode
[  227.136799] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[  227.154477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  227.175936] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  227.199583] team0: Port device team_slave_1 added
[  227.212201] bridge0: port 2(bridge_slave_1) entered blocking state
[  227.227924] bridge0: port 2(bridge_slave_1) entered disabled state
[  227.250897] device bridge_slave_1 entered promiscuous mode
[  227.294380] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[  227.310462] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[  227.341037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  227.366571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  227.392148] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  227.412196] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  227.444052] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  227.471243] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[  227.489459] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  227.497342] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  227.522415] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  227.546685] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  227.650846] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  227.657985] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  227.670054] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  227.729666] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  227.746841] team0: Port device team_slave_0 added
[  227.775498] bridge0: port 1(bridge_slave_0) entered blocking state
[  227.789037] bridge0: port 1(bridge_slave_0) entered disabled state
[  227.796427] device bridge_slave_0 entered promiscuous mode
[  227.808088] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  227.829247] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  227.844240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  227.870295] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  227.877645] team0: Port device team_slave_1 added
[  227.889409] bridge0: port 2(bridge_slave_1) entered blocking state
[  227.895761] bridge0: port 2(bridge_slave_1) entered disabled state
[  227.915487] device bridge_slave_1 entered promiscuous mode
[  227.973789] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  228.010734] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  228.028109] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[  228.049012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  228.063975] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  228.094419] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  228.122644] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  228.145773] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[  228.159634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  228.179290] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  228.220978] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  228.228415] team0: Port device team_slave_0 added
[  228.245479] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[  228.274964] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  228.293500] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  228.329092] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  228.343999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  228.376348] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  228.391677] team0: Port device team_slave_1 added
[  228.398858] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[  228.406020] bridge0: port 1(bridge_slave_0) entered blocking state
[  228.412511] bridge0: port 1(bridge_slave_0) entered disabled state
[  228.427826] device bridge_slave_0 entered promiscuous mode
[  228.440070] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  228.462140] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  228.481769] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  228.500462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  228.539791] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  228.551660] bridge0: port 2(bridge_slave_1) entered blocking state
[  228.561749] bridge0: port 2(bridge_slave_1) entered disabled state
[  228.589219] device bridge_slave_1 entered promiscuous mode
[  228.608455] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  228.660714] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  228.678066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  228.740567] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  228.768433] team0: Port device team_slave_0 added
[  228.780214] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  228.788662] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  228.803855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  228.821941] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  228.859238] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  228.866995] team0: Port device team_slave_1 added
[  228.949087] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  228.960344] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  228.971876] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  228.987161] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  229.012584] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[  229.033429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  229.050510] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  229.135126] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[  229.167655] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  229.184561] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  229.273857] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  229.289049] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  229.304853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  229.323081] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  229.336392] team0: Port device team_slave_0 added
[  229.350574] bridge0: port 2(bridge_slave_1) entered blocking state
[  229.357090] bridge0: port 2(bridge_slave_1) entered forwarding state
[  229.364340] bridge0: port 1(bridge_slave_0) entered blocking state
[  229.370802] bridge0: port 1(bridge_slave_0) entered forwarding state
[  229.381644] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[  229.401963] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  229.429669] team0: Port device team_slave_1 added
[  229.439295] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  229.449113] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  229.491247] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  229.510753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  229.546367] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  229.600291] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  229.693061] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  229.795974] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  229.822194] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  229.837715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  229.938695] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  229.964326] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  229.986365] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  230.001086] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  230.023433] bridge0: port 2(bridge_slave_1) entered blocking state
[  230.029867] bridge0: port 2(bridge_slave_1) entered forwarding state
[  230.036535] bridge0: port 1(bridge_slave_0) entered blocking state
[  230.042946] bridge0: port 1(bridge_slave_0) entered forwarding state
[  230.062893] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[  230.201604] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  230.210022] team0: Port device team_slave_0 added
[  230.328054] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  230.356970] team0: Port device team_slave_1 added
[  230.420478] bridge0: port 2(bridge_slave_1) entered blocking state
[  230.426873] bridge0: port 2(bridge_slave_1) entered forwarding state
[  230.433592] bridge0: port 1(bridge_slave_0) entered blocking state
[  230.439983] bridge0: port 1(bridge_slave_0) entered forwarding state
[  230.471092] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[  230.500410] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[  230.508077] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  230.529808] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  230.680988] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  230.779315] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  230.786426] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  230.809523] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  230.820213] bridge0: port 2(bridge_slave_1) entered blocking state
[  230.826563] bridge0: port 2(bridge_slave_1) entered forwarding state
[  230.833205] bridge0: port 1(bridge_slave_0) entered blocking state
[  230.839611] bridge0: port 1(bridge_slave_0) entered forwarding state
[  230.847315] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[  230.930515] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  230.937664] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  230.946918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  230.965236] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  230.979949] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  230.987522] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  231.291618] bridge0: port 2(bridge_slave_1) entered blocking state
[  231.298662] bridge0: port 2(bridge_slave_1) entered forwarding state
[  231.305339] bridge0: port 1(bridge_slave_0) entered blocking state
[  231.311794] bridge0: port 1(bridge_slave_0) entered forwarding state
[  231.335953] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[  232.009397] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  232.117404] bridge0: port 2(bridge_slave_1) entered blocking state
[  232.123843] bridge0: port 2(bridge_slave_1) entered forwarding state
[  232.130555] bridge0: port 1(bridge_slave_0) entered blocking state
[  232.136915] bridge0: port 1(bridge_slave_0) entered forwarding state
[  232.181452] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[  233.039023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  234.421058] 8021q: adding VLAN 0 to HW filter on device bond0
[  234.673000] 8021q: adding VLAN 0 to HW filter on device bond0
[  234.874342] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  235.113351] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  235.229978] 8021q: adding VLAN 0 to HW filter on device bond0
[  235.324649] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  235.337142] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  235.349326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  235.470248] 8021q: adding VLAN 0 to HW filter on device bond0
[  235.571820] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  235.578018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  235.589199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  235.740683] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  235.813471] 8021q: adding VLAN 0 to HW filter on device team0
[  235.947296] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  236.037573] 8021q: adding VLAN 0 to HW filter on device team0
[  236.143453] 8021q: adding VLAN 0 to HW filter on device bond0
[  236.170417] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  236.190930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  236.198105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  236.406942] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  236.428939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  236.436044] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  236.503434] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  236.609264] 8021q: adding VLAN 0 to HW filter on device team0
[  236.779189] 8021q: adding VLAN 0 to HW filter on device bond0
[  236.835747] 8021q: adding VLAN 0 to HW filter on device team0
[  236.998402] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  237.017577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  237.039511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  237.155858] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  237.424125] 8021q: adding VLAN 0 to HW filter on device team0
[  237.644389] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  237.651529] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  237.660387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  238.044244] 8021q: adding VLAN 0 to HW filter on device team0
07:48:43 executing program 0:
ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2b5}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x7})
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000480)={[0x4], 0x0, 0x1a200})
ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x3)
ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, 0x0)
sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000100)}, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "7914084b165e9ec52f1595ab29ebf015f37b541a5750acb2ac95e9ad3962af352e5323b779821fa55ee14bf9"})
ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000))
ioctl$KVM_RUN(r2, 0xae80, 0x0)

07:48:43 executing program 1:
unshare(0x240203ff)
mknod(&(0x7f00000000c0)='./file0\x00', 0x1044, 0x0)
execve(&(0x7f0000f8aff8)='./file0\x00', 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000002680)='syscall\x00')
readv(r0, &(0x7f0000000480)=[{&(0x7f0000000100)=""/174, 0xae}], 0x1)
write$P9_ROPEN(r0, 0x0, 0x290)
open(&(0x7f0000000000)='./file0\x00', 0x401, 0x0)

[  238.789391] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details.
07:48:44 executing program 1:
r0 = signalfd(0xffffffffffffffff, &(0x7f0000000080)={0x3}, 0x8)
ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x4, 0x0, [], [{0x80, 0x3, 0x1, 0x5, 0x1, 0x1f}, {0x6e, 0x80000000, 0x100000000, 0x57, 0x2}], [[], [], [], []]})
socketpair$inet(0x1e, 0x5, 0x0, &(0x7f00000001c0)={<r1=>0x0, <r2=>0x0})
r3 = socket$inet6(0xa, 0x1000000000002, 0x0)
ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070")
close(r1)
clock_gettime(0x0, &(0x7f0000000300)={0x0, <r4=>0x0})
recvmmsg(r2, &(0x7f0000000200)=[{{&(0x7f0000000000)=@rc, 0x80, &(0x7f0000003440)=[{&(0x7f0000002440)=""/4096, 0x1000}], 0x1, &(0x7f00000034c0)=""/59, 0x3b}}, {{&(0x7f0000005880)=@rc, 0x80, &(0x7f0000005980)=[{&(0x7f0000000100)=""/87, 0x57}], 0x199}}], 0x2, 0x60, &(0x7f0000005d40)={0x0, r4+10000000})

[  238.967550] *** Guest State ***
[  238.992276] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7
[  239.020752] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871
07:48:44 executing program 1:
open_by_handle_at(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="08000000000000ef35162299f800"], 0x0)
ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/130)
mmap(&(0x7f0000600000/0x4000)=nil, 0x4000, 0x0, 0x1000044031, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0)
io_setup(0x5b3, &(0x7f0000000040)=<r1=>0x0)
io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x2300000000000000, 0xf0000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}])
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x31, r0, 0x400000)

[  239.079716] CR3 = 0x0000000000000000
[  239.093180] RSP = 0x0000000000000000  RIP = 0x0000000000000000
[  239.135513] RFLAGS=0x0001a202         DR7 = 0x0000000000000400
[  239.158698] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000
[  239.174825] CS:   sel=0xf000, attr=0x0009b, limit=0x0000ffff, base=0x00000000ffff0000
[  239.192916] DS:   sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000
[  239.228820] SS:   sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000
[  239.236835] ES:   sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000
[  239.261626] hrtimer: interrupt took 26551 ns
[  239.272932] FS:   sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000
[  239.292752] GS:   sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000
[  239.318517] GDTR:                           limit=0x0000ffff, base=0x0000000000000000
[  239.351353] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000
[  239.362042] IDTR:                           limit=0x0000ffff, base=0x0000000000000000
07:48:44 executing program 1:
open_by_handle_at(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="08000000000000ef35162299f800"], 0x0)
ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/130)
mmap(&(0x7f0000600000/0x4000)=nil, 0x4000, 0x0, 0x1000044031, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0)
io_setup(0x5b3, &(0x7f0000000040)=<r1=>0x0)
io_submit(r1, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x2300000000000000, 0xf0000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0xfffffce4}])
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x31, r0, 0x400000)

[  239.414139] TR:   sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000
[  239.448683] EFER =     0x0000000000000000  PAT = 0x0007040600070406
07:48:44 executing program 2:
r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x7fff, 0x440802)
sync_file_range(r0, 0x9, 0x1, 0x7)
clock_adjtime(0x0, &(0x7f0000000000)={0x7ff, 0x0, 0x3f420f0000000000})

[  239.464706] DebugCtl = 0x0000000000000000  DebugExceptions = 0x0000000000000000
[  239.480098] Interruptibility = 00000000  ActivityState = 00000000
[  239.495698] *** Host State ***
[  239.501219] RIP = 0xffffffff8120262c  RSP = 0xffff88018395f390
[  239.530719] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040
[  239.537241] FSBase=00007efd962da700 GSBase=ffff8801dae00000 TRBase=fffffe0000033000
[  239.546912] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000
[  239.553069] CR0=0000000080050033 CR3=00000001cd912000 CR4=00000000001426f0
[  239.574233] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff87e01360
07:48:44 executing program 2:
r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x3, 0x2)
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000380)=0x3, 0x4)
sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="dfe278d84f047e1808a3a992ddc389ae510e72c21d071d767c92f5a76aabd0152fcbd05c4db7f4e5e729497dfc375f1a021a5b1fd8ea7d7047775b8daf66303ddae94f4cc9d10f0e4bd21802c30927bf91de19baad5d68d29e6c0265b15278bc3a26defe99b129cae1e0377939e119e495cb84900b82d2c0689fd8d30bcd08437ed371f99c2b1cb8434a8ed7a106d463883ccdd36f76022dd29c59311fd01f26dc7cb7bb2578798d919b871cbb90dda4fccbca8d521c0c9c95c6278cad91c144f5079d7aa44b35c54465cb314586eae1b2afb0d94912bea757906d494c2e049598bae15d4a1b6892ed414e4ca5448a7e457350859333529825a60e93889fece46d4917cb7b429852148679694cbbb5d71bd8c81da130daf7387dc095c6ea85a19f5c62434a0b42723ae95420971a2edaa24f04e1c558283be5b08d1903dd2aa5b55ff876b7df8ad497a163fc1667bf677560acc9bdc58fd2190ceb7ee16969f2b7924651b5256b83fa8cee4a85b601371092d883db7c63cc060f80cc96a47d90dfc06ebf61665b68ab6c40e701325f2ad65b98bbc038fc1f70c5cec0ef6de84b30f331304e18333bf6018ab00b454771618a74cdcb90bae013843a586b8da3f26fc134faea8f02f500ccfc8d8e056bfe8154a816b1c836d2f0345fe72801be88a7bf12b5b70f3fca631f4f27ade17670201ca78090a2ce78f7660b62d6b1ae74b4", 0x201, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x3, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x1c)
r1 = socket(0x11, 0xf, 0x0)
mknod(&(0x7f0000000400)='./file0\x00', 0x8800, 0x3225)
setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f00000002c0)=ANY=[@ANYBLOB="0000000000854fd1510000007dac2dd78bd9f6b19ce173ba6627576e833914e430945f1a887e2db794c9cf77183cdfdac79ae1ea83265495492f2899321e403bd6d9f223eda079c82325780eb07cccadb33cd887c6c1edeee680c1bb37024d492c9f925fe33f52b5563ce3d8b10c7c5bf5b85926ef406196ae9a302f1e26cdda6afc3cb917531220979a4f864a40cc0b0dd17f867bbed0f16b585e634b576ef3fc09638144a87b1cceb6b377f0d97dfcbaadb58daa72b681827a4eded3"], 0x8)
chroot(&(0x7f00000003c0)='./file0\x00')
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4)
getsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f00000001c0)=""/101, &(0x7f0000000280)=0x65)

[  239.594838] EFER = 0x0000000000000d01  PAT = 0x0407050600070106
[  239.609885] *** Control State ***
[  239.619058] PinBased=0000003f CPUBased=b5a06dfa SecondaryExec=000000c3
[  239.648995] EntryControls=0000d1ff ExitControls=002fefff
[  239.678915] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000
07:48:44 executing program 2:
socketpair$inet6(0xa, 0x0, 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, &(0x7f0000001000)=""/4096, &(0x7f00000002c0)=0x1000)
io_submit(0x0, 0x0, &(0x7f0000000fc0))
getpeername$inet6(0xffffffffffffffff, &(0x7f00000008c0)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000980)=0x1c)
syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0)
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$can_raw(0xffffffffffffffff, 0x0, 0x0)
ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x13000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x2000000})
ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, 0x0)
shutdown(0xffffffffffffffff, 0x0)
accept(0xffffffffffffffff, &(0x7f0000000040)=@ethernet={0x0, @broadcast}, 0x0)
syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0xffffffffffffffff, 0x2)
close(0xffffffffffffffff)
ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@remote, @empty, @dev={0xfe, 0x80, [], 0x21}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000})
r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0)
setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000180)=0x401, 0x4)
getpgrp(0x0)
migrate_pages(0x0, 0x9, &(0x7f0000000040), &(0x7f0000000080))
ustat(0x8, &(0x7f0000000080))
ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x550b, &(0x7f0000000000))

[  239.696505] VMEntry: intr_info=800000b5 errcode=00000000 ilen=00000000
[  239.713857] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000
[  239.750250]         reason=80000021 qualification=0000000000000000
[  239.776099] IDTVectoring: info=00000000 errcode=00000000
[  239.791069] TSC Offset = 0xffffff7e0ef0b55e
07:48:45 executing program 1:
r0 = socket$packet(0x11, 0x0, 0x300)
setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0)
sched_setaffinity(0x0, 0x0, 0x0)
r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2000000006}, 0x1c)
ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000140)={'vcan0\x00', <r3=>0x0})
setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @remote}, 0x10)
connect$inet6(r2, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c)
sendmmsg(r2, &(0x7f00000002c0), 0x400000000000027, 0x0)

[  239.798917] TPR Threshold = 0x00
[  239.808987] EPT pointer = 0x00000001d89be01e
07:48:45 executing program 0:
r0 = socket$unix(0x1, 0x3, 0x0)
r1 = socket$unix(0x1, 0x2, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0)
fchdir(r2)
sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5)
syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[])
r3 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0)
write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd97)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0)
setsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f00000000c0)={0x53e4, 0x5, 0x7f, 0x3}, 0x8)
ioctl$TIOCGLCKTRMIOS(r3, 0x5456, &(0x7f00000002c0)={0x2, 0x6, 0x4, 0x7, 0xadc, 0x0, 0x7, 0xfff, 0x3, 0x10000, 0x1000, 0x101})
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000140)={<r4=>0x0, 0x1}, &(0x7f0000000300)=0x8)
setsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000440)=ANY=[@ANYRES32=r4, @ANYBLOB="ff5fefed197210"], 0xa)
mkdir(&(0x7f0000001340)='./file0\x00', 0x0)
ioctl$KVM_S390_UCAS_MAP(r3, 0x4018ae50, &(0x7f0000000280)={0xeb09, 0x7ff, 0x3ff})
r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
execveat(r5, &(0x7f0000000380)="e91f7189591e9233614b00", &(0x7f0000000640)=[&(0x7f0000000480)='cgroup.procs\x00', &(0x7f0000000500)="656d306367726f75705c40707070312b2a29e6232f6367726f75702500", &(0x7f0000000540)='#^\x00', &(0x7f0000000580)='vfat\x00', &(0x7f00000005c0)='./cgroup\x00', &(0x7f0000000600)='^!\x00'], &(0x7f0000000680), 0x400)
accept4(r1, &(0x7f0000000040)=@ax25, &(0x7f0000000100)=0x80, 0x80800)
r6 = openat$cgroup_procs(r5, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KDSETKEYCODE(r3, 0x4b4d, &(0x7f0000000400)={0x60c, 0x8001})
rmdir(&(0x7f00000000c0)='./file0\x00')
r7 = dup2(r5, r6)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc)
epoll_ctl$EPOLL_CTL_DEL(r5, 0x2, r1)
connect(r0, &(0x7f0000987ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc)
epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r7, &(0x7f0000000240)={0x4})
mknod(&(0x7f0000000040)='./file0\x00', 0x11, 0xad)
syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote={0xac, 0x1c}, @local}, @igmp={0xd, 0x0, 0x0, @broadcast}}}}}, &(0x7f0000000000))

07:48:45 executing program 4:
r0 = add_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="3058020af10cb8b56c96d27c44d58e94ea51a7dfc59e92e80d9482ca7839173a8f1143a711f5a939b4fd0072693a46c08df6616dd21be3453ecf73039a20f43acbc5376139a9070ae27dd847474d1e59b2697801e6ebd80f75ca", 0x5a, 0xfffffffffffffffd)
r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0)
r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00')
getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0xff, "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"}, &(0x7f0000000440)=0x123)
keyctl$restrict_keyring(0x1d, r0, &(0x7f00000001c0)='logon\x00', &(0x7f00000002c0)='IPVS\x00')
sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x221000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000", @ANYRES16=r2, @ANYBLOB="000029bd70e206050012007c0000000000b900000000010000004c74686b48162d580c"], 0x14}, 0x1, 0x0, 0x0, 0x4c080}, 0x80)
ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000480)=<r3=>0x0)
sched_rr_get_interval(r3, &(0x7f00000004c0))

[  240.834337] PKCS8: Unsupported PKCS#8 version
[  240.852476] PKCS8: Unsupported PKCS#8 version
07:48:46 executing program 1:
r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x0, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000280)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r2=>0x0}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8)
stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0})
write$FUSE_ENTRY(r1, &(0x7f0000000380)={0x90, 0x0, 0x3, {0x0, 0x3, 0x21, 0x8, 0x4eb4, 0x0, {0x5, 0x3, 0x3f, 0x5, 0x8, 0x3, 0x6, 0x3, 0x7f, 0x100000000, 0x101, r2, r3, 0x2, 0x3}}}, 0x90)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0x1, 0x0)
ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000000))
syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x2, 0x0)
epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000200)={0xa0000001})
syz_open_pts(r4, 0x0)
r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0)
r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r6)
socket$unix(0x1, 0x5, 0x0)
dup2(r1, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r7=>0xffffffffffffffff})
mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0xc, 0x30, r7, 0x0)
pselect6(0x40, &(0x7f0000000100)={0xfff}, 0x0, 0x0, 0x0, 0x0)

07:48:46 executing program 5:
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000880)={{{@in=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000980)=0xe8)
setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000b00)={0x1, 0xfffffffffffffffa}, 0x8)
r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000580)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0)
syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000240)=ANY=[])
ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x1)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0)
syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[])
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x5c000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]})
syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x0, 0x2)
r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vsock\x00', 0x0, 0x0)
openat(r1, &(0x7f0000000240)='./file0\x00', 0x80100, 0x48)
open$dir(&(0x7f0000000280)='./control/file0\x00', 0x0, 0x0)
setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000600)=0x5, 0x4)
getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0), 0x10)
write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18)
r2 = userfaultfd(0x0)
fcntl$getownex(r2, 0x10, &(0x7f0000000340)={0x0, <r3=>0x0})
setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000001c0), 0x4)
syz_open_procfs$namespace(r3, &(0x7f0000000380)='ns/cgroup\x00')
ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0)
getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000003c0)={<r4=>0x0, @in={{0x2, 0x4e23, @rand_addr=0xd3}}}, &(0x7f0000000480)=0x84)
getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000004c0)={r4, 0x2, 0x20}, &(0x7f0000000500)=0xc)
getrandom(&(0x7f0000000a80)=""/86, 0xffffffffffffff62, 0x3)

07:48:46 executing program 3:
pipe(&(0x7f0000000180)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
rt_sigprocmask(0x1, &(0x7f0000072ff8)={0x9}, 0x0, 0x8)
r2 = dup2(r1, r0)
io_setup(0x400000000000082, &(0x7f0000001640)=<r3=>0x0)
io_submit(r3, 0x2000000000000227, &(0x7f0000000140)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f00000002c0)="6e36753810a3fbf8bcaa44abc688170dbcd1f72bb4f663d5ae3efad779034107750764fec73021fc2ba9274b8d677baa4d6a82e712efd31f694f89dd336e4e5a2be6ca3969bc301b4f3b3a731cb615e2ca645e876276d91e741574f3f574ca0772aef374168e86fd3ba28f82e432e4e59221c4c41729b900e0f8dff1d4423657b68de6bf800e91e55466225c0c72947944b240f7e58c0f", 0x1}])
setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4)

07:48:46 executing program 2:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x200007fc, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10)
sendto$inet(r0, &(0x7f00000005c0)="1a8c443d3a568c81cc096aa87ddab0f1b182da383fd71795f41053261e63b0b9f1283f7431b6146106716c21b43625f9194bf4b6a5dba53c46b82862a2f804121cda7e6be8fd507bb1545de629746d878f10be8036e98a270c42d6458f97b342303464e94ccb6d6f4f81941e3f3fa371596cdf17e160c992140c9dc81362f019f017", 0x82, 0x0, 0x0, 0x0)
setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000300)='dctcp\x00', 0x6)
readv(r0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/226, 0xfffffd85}], 0x1)
semget(0xffffffffffffffff, 0x0, 0x0)
openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
recvfrom(r0, &(0x7f0000000380)=""/239, 0x57, 0xfffffffffffffffd, 0x0, 0x0)
close(r0)

07:48:46 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0)
r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="d8472600"], &(0x7f0000000180)=0x1)
getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000002c0)={0x0, 0x100000001, 0x9, 0x0, 0x0, 0x5}, &(0x7f0000000300)=0x14)
r3 = syz_open_procfs(0x0, &(0x7f0000000080)="2f6578650000000000000f1ce3000000000000000000000000")
fcntl$setstatus(r3, 0x4, 0x14400)
mprotect(&(0x7f0000104000/0x3000)=nil, 0x3000, 0x0)
poll(&(0x7f0000000400)=[{r1, 0x1}, {r1, 0x1410}, {r1, 0x120c}, {r1, 0x2183}, {}], 0x5, 0x8)
pread64(r3, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0)
ioctl$SNDRV_CTL_IOCTL_PVERSION(0xffffffffffffffff, 0xc1105518, &(0x7f0000001000))
fgetxattr(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], &(0x7f0000000340)=""/144, 0x90)
ioctl$KVM_IRQ_LINE(r3, 0x4008ae61, &(0x7f0000000000)={0x0, 0x9})
socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000480))
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)="2f6578650000000000000f1ce300", r2}, 0x10)
sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000640)=[{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000580)="b5d7522f9d33b63f526ccc682338444a302afa4b8659b651f6dd80f6217b3ad368cce469ca517224d7", 0x29}], 0x1, &(0x7f0000001080)}], 0x1, 0x4010)
r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000008c0)={0x0, 0x0, 0x72feb984}, &(0x7f0000000900)=0x10)
ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60)
ioctl$KVM_CREATE_PIT2(r4, 0x4040ae77, &(0x7f0000000500)={0x4000})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x8000}, 0x20004080)
getegid()
r5 = dup2(r0, r4)
ioctl$KVM_HYPERV_EVENTFD(r3, 0x4018aebd, &(0x7f0000000440)={0xfffffffffffffff8, r5, 0x1})
syz_emit_ethernet(0x30, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @local, [], {@llc_tr={0x11, {@snap={0x0, 0x1, "ed", "80da46", 0x89ff, "5873867110c22f81a95a544d15c962a6faf92bb1cc24dae03057"}}}}}, &(0x7f0000000100)={0x1, 0x2, [0xb1c, 0x9e6, 0xab3, 0xb70]})

07:48:46 executing program 2:
futex(&(0x7f0000000080), 0x8f, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x1, 0x1)
setrlimit(0x40000000000008, &(0x7f0000000000))
r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0)
ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x81)
capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000))
mlock2(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0)

07:48:46 executing program 0:
r0 = socket$unix(0x1, 0x3, 0x0)
r1 = socket$unix(0x1, 0x2, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0)
fchdir(r2)
sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5)
syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732a666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[])
r3 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0)
write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd97)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mknod(&(0x7f0000000340)='./file0/file1\x00', 0x0, 0x0)
setsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f00000000c0)={0x53e4, 0x5, 0x7f, 0x3}, 0x8)
ioctl$TIOCGLCKTRMIOS(r3, 0x5456, &(0x7f00000002c0)={0x2, 0x6, 0x4, 0x7, 0xadc, 0x0, 0x7, 0xfff, 0x3, 0x10000, 0x1000, 0x101})
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000140)={<r4=>0x0, 0x1}, &(0x7f0000000300)=0x8)
setsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000440)=ANY=[@ANYRES32=r4, @ANYBLOB="ff5fefed197210"], 0xa)
mkdir(&(0x7f0000001340)='./file0\x00', 0x0)
ioctl$KVM_S390_UCAS_MAP(r3, 0x4018ae50, &(0x7f0000000280)={0xeb09, 0x7ff, 0x3ff})
r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
execveat(r5, &(0x7f0000000380)="e91f7189591e9233614b00", &(0x7f0000000640)=[&(0x7f0000000480)='cgroup.procs\x00', &(0x7f0000000500)="656d306367726f75705c40707070312b2a29e6232f6367726f75702500", &(0x7f0000000540)='#^\x00', &(0x7f0000000580)='vfat\x00', &(0x7f00000005c0)='./cgroup\x00', &(0x7f0000000600)='^!\x00'], &(0x7f0000000680), 0x400)
accept4(r1, &(0x7f0000000040)=@ax25, &(0x7f0000000100)=0x80, 0x80800)
r6 = openat$cgroup_procs(r5, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KDSETKEYCODE(r3, 0x4b4d, &(0x7f0000000400)={0x60c, 0x8001})
rmdir(&(0x7f00000000c0)='./file0\x00')
r7 = dup2(r5, r6)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc)
epoll_ctl$EPOLL_CTL_DEL(r5, 0x2, r1)
connect(r0, &(0x7f0000987ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc)
epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r7, &(0x7f0000000240)={0x4})
mknod(&(0x7f0000000040)='./file0\x00', 0x11, 0xad)
syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote={0xac, 0x1c}, @local}, @igmp={0xd, 0x0, 0x0, @broadcast}}}}}, &(0x7f0000000000))

07:48:46 executing program 3:
r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-net\x00', 0x2, 0x0)
ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000)
ioctl$int_in(r0, 0x40000000af01, 0x0)
ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000280)=""/246, 0x0})
write$vnet(r0, &(0x7f00000001c0)={0x1, {&(0x7f0000000100)=""/139, 0x8b, 0x0, 0x0, 0x2}}, 0x68)
r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0)
close(r1)
socket$packet(0x11, 0x3, 0x300)
r2 = fcntl$getown(r0, 0x9)
sched_rr_get_interval(r2, &(0x7f0000000040))
ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000200)=ANY=[])
ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1})

[  241.145511] __ntfs_error: 8 callbacks suppressed
[  241.145521] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size.
[  241.296629] capability: warning: `syz-executor2' uses 32-bit capabilities (legacy support in use)
07:48:46 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0xfffffffffffffffc, 0x2)
connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c)
pread64(r0, &(0x7f0000000400)=""/193, 0xc1, 0x0)
setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000000)=@fragment, 0x8)
r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0xe6d8, 0x400)
ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f00000002c0)=ANY=[@ANYBLOB="010000200000dff83aa2201dcabaabb5f0d136547ddf20255380f60c8a7390bddaa32fd6a0e31007000000150a777a9ab5775bd07992b8025c13803e7de24cea9e734519000000000000000000000000002dad410bb44d11893602536755341a49829d769c3fb4d75fc798a137dcf8fd7c2fa417847691ee52f7a1a5fad3a6b4103c1c3ab75927ba08ba36a83bcd7accadd34461bb007af3622206cafabefb5c30641c818f387a49dd2b803ef43dab463ba8f43abd1b10ad573b7f78883547db436dd102473987f9c84ce646a1b05bda83beefd47d329b8f6dcdf182336dcb9709017987d95163083a81e3771aac338b1dafc091d6252ed78ee8de3b18df73aecec59d4c27ba4a638809b92f44d1e47d25d1"])
getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000180)=""/212, &(0x7f0000000080)=0xd4)
sendmmsg(r0, &(0x7f00000002c0), 0x400000000000018, 0x0)
ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0)

07:48:46 executing program 4:
r0 = socket$inet6_udp(0xa, 0x2, 0x0)
r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x100, 0x0)
setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000040)={'mangle\x00', 0x3, [{}, {}, {}]}, 0x58)
setsockopt$sock_void(r0, 0x29, 0x10000000030, 0x0, 0x300)

07:48:46 executing program 1:
r0 = socket$inet6(0xa, 0x803, 0x400000000)
ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070")
r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-control\x00', 0x280400, 0x0)
write$P9_RWALK(r1, &(0x7f00000002c0)={0x23, 0x6f, 0x1, {0x2, [{0x24, 0x4, 0x5}, {0x0, 0x2, 0x7}]}}, 0x23)
rt_sigprocmask(0x0, &(0x7f0000000280)={0xfffffffffffffff8}, 0x0, 0xffffffffffffff70)
r2 = gettid()
timer_create(0x8, &(0x7f0000000040)={0x0, 0x6, 0x20000000004, @tid=r2}, &(0x7f0000000200))
clock_gettime(0x0, &(0x7f00000001c0)={0x0, <r3=>0x0})
timer_settime(0x0, 0x1, &(0x7f0000000080)={{0x0, r3+30000000}, {0x0, 0x989680}}, 0x0)
r4 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x800, 0x0)
write$UHID_DESTROY(r4, &(0x7f0000000180), 0x4)
timer_settime(0x0, 0x0, &(0x7f0000000000)={{}, {0x0, 0xe4c}}, &(0x7f0000000100))

[  241.577947] overlayfs: filesystem on './file0' not supported as upperdir
07:48:46 executing program 4:
r0 = socket$inet6_sctp(0xa, 0x9, 0x84)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@broadcast, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000000)=0xe8)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0x9, &(0x7f0000000100)={&(0x7f0000000c00)=@newtfilter={0x92c, 0x2c, 0x300, 0x70bd2c, 0x25dfdbff, {0x0, r1, {0x7, 0xf}, {0xffff, 0x2}, {0x2, 0x3}}, [@TCA_RATE={0x8, 0x5, {0x400, 0x6}}, @TCA_RATE={0x8, 0x5, {0x101, 0x7}}, @TCA_CHAIN={0x8, 0xb, 0x7}, @TCA_RATE={0x8, 0x5, {0x8, 0x3}}, @filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x8cc, 0x2, [@TCA_ROUTE4_POLICE={0x408, 0x5, @TCA_POLICE_RATE={0x404, 0x2, [0x1f, 0x7fffffff, 0x1000, 0x1, 0x3, 0xb2, 0x6, 0x9, 0x8, 0x2, 0x7, 0x2, 0x7, 0x76, 0x2, 0x9, 0x2, 0x5f8b, 0x5, 0x1000, 0x8001, 0xf4c, 0x1f, 0x0, 0x1ff, 0x8, 0x200, 0xb5, 0xffffffff00000000, 0x401, 0x5, 0x8, 0x909a, 0x80, 0x100, 0xb9c, 0x1, 0x59, 0x80, 0x828c, 0x6, 0xff, 0x3, 0xf7, 0x3ff, 0x3b, 0x5, 0x0, 0x1, 0x2, 0x1f, 0x903, 0x6, 0xfffffffffffffffa, 0x4, 0xa605, 0x2c441e0c, 0x80000001, 0xff, 0x6, 0x0, 0x0, 0x4, 0x66cc, 0x800000000000000, 0xffffffff, 0x80, 0x10f, 0x7, 0x7, 0x31c9, 0x100000001, 0x3d238000000, 0xfffffffffffffffa, 0xffff, 0x2, 0x0, 0x2, 0xfff, 0x547c, 0xffff, 0x0, 0x7, 0x7, 0xb356, 0x8000, 0x0, 0x8, 0x5, 0x4, 0xb3, 0x500000, 0x0, 0x7, 0x1, 0x0, 0xab9d, 0x80000001, 0x1, 0x4, 0x4, 0x58b, 0x393, 0x6, 0x5, 0x8000, 0x1, 0x8, 0x7fff, 0xd1, 0x40, 0x419, 0xffffffffffffffff, 0x3, 0x6, 0x8001, 0xffffffff, 0x7ff, 0x9, 0x8, 0x3, 0xbe, 0x7, 0x0, 0x3f, 0x0, 0x3, 0xfffffffffffffff7, 0xd99, 0x9, 0xa7, 0x7ff, 0xc6, 0xa91, 0x8, 0x0, 0x201b, 0xffff, 0x3, 0x8001, 0xffffffffffffffd4, 0x8000, 0xf4b, 0x34cb, 0x2, 0x9, 0xf45, 0x100000000, 0x6adb, 0x0, 0x8000, 0x6, 0x2, 0x8001, 0x4e, 0x2, 0x9, 0x7ff, 0x2, 0x2, 0x3, 0x7f, 0x8, 0x2000000000000, 0x24, 0x761, 0x1ff, 0x5f917e43, 0x401, 0x581, 0xec, 0xea41, 0x0, 0x100000000, 0x1ff, 0xfd, 0x80000001, 0x0, 0x7, 0x81, 0xff, 0x0, 0x23, 0x3, 0x4, 0x8, 0x0, 0xb39, 0x3063, 0xffff, 0x3, 0x7ff, 0x0, 0x2, 0xc6, 0x800, 0x3, 0x4, 0x7fffffff, 0x9, 0x8, 0x0, 0x6, 0x1, 0x6, 0xffffffff, 0x4, 0x4, 0x2, 0x7, 0x7f, 0x352e, 0x6, 0xb74f, 0xada, 0x4, 0x3f, 0x0, 0x6, 0x3f, 0x6, 0x8000, 0x80, 0x2, 0x4, 0x3, 0x800, 0x100, 0x1ff, 0xa554, 0x20, 0x4, 0x8, 0xffffffffffffffc0, 0x10001, 0xcf3c, 0xc40a, 0x7c16, 0x80000000, 0x5, 0x4, 0x0, 0x1000, 0x8000, 0x200000000000000, 0x8, 0x0, 0x2, 0x80, 0x5, 0xfffffffffffffff7, 0x11d, 0xe740, 0x0, 0x8f5, 0x8]}}, @TCA_ROUTE4_ACT={0xb8, 0x6, @m_sample={0xb4, 0xa, {{0xc, 0x1, 'sample\x00'}, {0x34, 0x2, [@TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0xcb}, @TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0xfffffffffffffffc}, @TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0x7ff}, @TCA_SAMPLE_PARMS={0x18, 0x2, {0x7f, 0x101, 0xffffffffffffffff, 0x40, 0x100000001}}]}, {0x6c, 0x6, "d915667a41ab36b125cf62c4e4bb77b817fc91276b9be323f7a8e5918d48ac545c48a953585c304e222e88ae1e714690745b3f3c80a709e213c15eaddc1023e5aa569552c4521cc580fb381fe5273e53cb2b06f91943ee14cea1d26e7990bcb73b09b1558dfa"}}}}, @TCA_ROUTE4_POLICE={0x408, 0x5, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x80000000, 0xffffffff, 0x5, 0x8001, 0x8e, 0x401, 0x7fffffff, 0x7, 0x823, 0x3, 0x9, 0x0, 0x9, 0x80, 0x1, 0x401, 0x6b, 0x10001, 0x0, 0x4, 0x3, 0xff, 0xfd9, 0x5, 0x3, 0xdd5b, 0x0, 0xf5da, 0x1, 0x5, 0xffffffffffffff99, 0x1f, 0x3, 0x5, 0x5, 0x4, 0x40, 0x9, 0x6, 0x3, 0xfffffffffffffeff, 0x8, 0x1, 0x3, 0x2, 0x2, 0xd5a, 0x0, 0xffff, 0x3, 0x0, 0x100000000, 0x5, 0xa1, 0x240000000, 0x9, 0x3, 0x80, 0x4, 0x6, 0x0, 0x2, 0x5, 0x81, 0x6, 0x400, 0x6, 0x7fff, 0x75, 0x46f6, 0x41, 0x100000001, 0x3, 0x40000000000000, 0xfffffffffffffe01, 0xc9be, 0x966c, 0x9, 0x1, 0x4159, 0x3, 0xf9, 0x8, 0x7, 0xfffffffffffffe00, 0xbc, 0x1, 0x21, 0x3, 0x7, 0x2, 0x2, 0x5, 0x81, 0xffff, 0x7f, 0x2c10, 0x0, 0x4d, 0x7845, 0x3ff, 0x5, 0x0, 0xda68, 0x6, 0x3ff, 0xff, 0x3, 0x8, 0x79, 0x8, 0xff, 0x7f, 0x1, 0x9, 0x1, 0xfffffffffffffffc, 0x14, 0xffffffff, 0x4, 0x3, 0x8, 0x8, 0x10000, 0x9, 0x3d2f0f9, 0x8, 0x0, 0x1, 0xffff, 0x10000, 0x10001, 0xf9df, 0x8, 0x2, 0x401, 0x2, 0x0, 0x40, 0x3, 0x1000000000000000, 0x7, 0x5, 0xffffffffffff0914, 0x530, 0x3a6, 0x8001, 0x1, 0xfff, 0xff, 0x9, 0x73d, 0x1c00000, 0xe1c, 0x7, 0x3, 0x0, 0x0, 0xffff, 0xfffffffffffeffff, 0x1f, 0x2, 0x0, 0x400, 0x1, 0x2, 0x100000001, 0x7, 0x2, 0x4, 0xffffffff, 0x7fff, 0x8, 0xfffffffffffffffb, 0x3, 0x9, 0x81, 0x1, 0x9, 0xffe2, 0x5, 0x9, 0xd4, 0x3ff, 0xffff, 0xac80, 0x3, 0x40, 0x1, 0x1, 0x0, 0x63, 0x7, 0x2, 0x1, 0x7, 0xfffffffffffffff7, 0x7fffffff, 0x7, 0x7, 0xbe0, 0xff, 0x8, 0x9, 0x1ff, 0x7, 0xd344, 0x4, 0x392a, 0x1561, 0x3ff, 0x5, 0x2, 0x100000000, 0x20, 0xc0, 0x6, 0x10000, 0x8, 0x3, 0x401, 0x100000000, 0x8001, 0x8, 0x40, 0x100, 0x100000000, 0x7, 0x2bc1, 0x8, 0x3, 0x5, 0x2, 0x0, 0x5b4, 0x6, 0x9, 0x2d7b, 0x893, 0x3, 0x1, 0x4, 0x6, 0x6, 0x6, 0xfff, 0x8001, 0x4, 0x28000, 0xffffffff, 0x1f, 0x3, 0x7, 0x5e2, 0x6, 0x20]}}]}}, @TCA_RATE={0x8, 0x5, {0x10000, 0x98ee}}, @TCA_CHAIN={0x8, 0xb, 0x28}]}, 0x92c}, 0x1, 0x0, 0x0, 0x1}, 0x4008000)
sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0)

07:48:46 executing program 3:
r0 = syz_open_dev$dmmidi(&(0x7f0000056000)='/dev/dmmidi#\x00', 0x6f600000, 0x0)
openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4007, 0x0)
fcntl$setstatus(r0, 0x4, 0x0)

07:48:47 executing program 5:
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000880)={{{@in=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000980)=0xe8)
setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000b00)={0x1, 0xfffffffffffffffa}, 0x8)
r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000580)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0)
syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000240)=ANY=[])
ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x1)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0)
syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[])
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x5c000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]})
syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x0, 0x2)
r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vsock\x00', 0x0, 0x0)
openat(r1, &(0x7f0000000240)='./file0\x00', 0x80100, 0x48)
open$dir(&(0x7f0000000280)='./control/file0\x00', 0x0, 0x0)
setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000600)=0x5, 0x4)
getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0), 0x10)
write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18)
r2 = userfaultfd(0x0)
fcntl$getownex(r2, 0x10, &(0x7f0000000340)={0x0, <r3=>0x0})
setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000001c0), 0x4)
syz_open_procfs$namespace(r3, &(0x7f0000000380)='ns/cgroup\x00')
ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0)
getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000003c0)={<r4=>0x0, @in={{0x2, 0x4e23, @rand_addr=0xd3}}}, &(0x7f0000000480)=0x84)
getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000004c0)={r4, 0x2, 0x20}, &(0x7f0000000500)=0xc)
getrandom(&(0x7f0000000a80)=""/86, 0xffffffffffffff62, 0x3)

07:48:47 executing program 2:
r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000005880)='attr/keycreate\x00')
ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04)
ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "7b3177f4fc2eb04172d2a8fdd1c4c4cf144a23173b6605afb988de7e07195d78f75dd19a3782fb25bfe2566c845a0c58b40026e6f769649cdbff0000c400", "ee52c10d1e72a943ccff00000080991a0000725ade5543129bb000"})
ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1)

07:48:47 executing program 1:
socket$alg(0x26, 0x5, 0x0)
syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0)
socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000080))
r0 = syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0x1, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x101840)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
ioctl$FS_IOC_GETFLAGS(r0, 0xc1105511, &(0x7f0000000080))

07:48:47 executing program 3:
r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2)
recvmsg(r0, &(0x7f0000001480)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000001380)=[{&(0x7f0000000100)=""/27, 0x1b}, {&(0x7f0000000140)=""/153, 0x99}, {&(0x7f0000000200)=""/55, 0x37}, {&(0x7f0000000240)=""/145, 0x91}, {&(0x7f0000000300)=""/124, 0x7c}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x6, &(0x7f0000001400)=""/75, 0x4b}, 0x10143)
r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0)
ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x40081271, 0x400020)
r2 = getpgrp(0xffffffffffffffff)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000016c0)={r0, 0x50, &(0x7f0000001640)={0x0, <r3=>0x0}}, 0x10)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001700)={r2, r0, 0x0, 0xe, &(0x7f0000001600)='/dev/swradio#\x00', r3}, 0x30)
r4 = socket$inet6_udplite(0xa, 0x2, 0x88)
ioctl(r4, 0x20000000008912, &(0x7f0000000100)="0a5c2d0240316285717070")
r5 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0)
r6 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/keycreate\x00')
r7 = mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x13, r6, 0x0)
ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000001740)={r7})
setsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f00000014c0)=0x2, 0x4)
ioctl$LOOP_SET_STATUS64(r5, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x351, 0x0, 0x0, 0x0, 0x0, 0x0, "333a7967226dc88cdd4b3fe9a3d3d456462a30a2d7e524ec38477a4fd78e0c5aff782ce7e5d25783c021732af457bd8d030d2129837228028db6e68ed0ed71c9", "ee369ac65b7c48a0f85e4c14f0c99087b233f43894215adbd9da650737f8eecd65ad73b661b8a4912d778a0d18167ec6764f75480ba544786b77f6096483dfe7", "92e4c5a35314133e1368d102dce15ea4f4d39cb3644ebd0a0f807c17071cf095"})
ioctl$LOOP_CHANGE_FD(r5, 0x4c06, r6)

07:48:47 executing program 4:
r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x40000040101)
write$sndseq(r0, 0x0, 0xffffffffffffffe8)
r1 = epoll_create(0x105)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)={0x2008})
r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4000, 0x0)
ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000180)={{0x1, 0xd000, 0x1d, 0x6cc0, 0x5, 0x20, 0x3, 0x8, 0x2, 0x3882, 0x2, 0x1}, {0x0, 0xf000, 0xe, 0x0, 0x60, 0xfffffffffffffffe, 0x2, 0x6, 0x2, 0x7, 0x1ff}, {0x6000, 0x105000, 0xf, 0x10001, 0x72, 0x0, 0xfffffffffffffff8, 0x101, 0x2, 0x0, 0x5, 0x1000}, {0x1, 0x1, 0x1e, 0xffffffff, 0x1000, 0x8001, 0x2, 0x6, 0x0, 0xffffffffffff0001, 0x9, 0x5}, {0x1, 0x4000, 0xd, 0x7, 0x7f, 0x9, 0x8, 0x40, 0x4, 0x5, 0x0, 0x4}, {0x0, 0xf000, 0xf, 0x0, 0x3, 0x5, 0x4, 0x4, 0x9, 0x6, 0x6, 0x9}, {0x7000, 0xa83c18a251ef6c3e, 0x0, 0x2, 0x9, 0x3ff, 0xfff, 0x0, 0x7bd, 0x5, 0x7, 0x609c}, {0x17001, 0x4004, 0x10, 0x95e, 0x400, 0x84, 0x1000, 0x800, 0xfffffffffffffffe, 0x80000000, 0x20, 0x1}, {0x7000, 0x7000}, {0xd001, 0x4000}, 0x20, 0x0, 0x5000, 0x1, 0xf, 0x0, 0xd000, [0xe9d6, 0x0, 0x7, 0x80000001]})
ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, &(0x7f0000000040)=0x6413)
ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f000023efa8)={0x7f, 0x800003, 0xff, 0xfffffffffffffffd, 0xfffffffffffffffe, 0xfffffffffffffffd})

[  242.109595] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.116141] b_state=0x0000002b, b_size=512
[  242.120440] device loop0 blocksize: 4096
[  242.124512] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.130809] b_state=0x0000002b, b_size=512
[  242.135046] device loop0 blocksize: 4096
[  242.139180] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.145422] b_state=0x0000002b, b_size=512
[  242.149703] device loop0 blocksize: 4096
[  242.153770] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.160300] b_state=0x0000002b, b_size=512
[  242.164538] device loop0 blocksize: 4096
[  242.168657] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.174891] b_state=0x0000002b, b_size=512
[  242.179175] device loop0 blocksize: 4096
[  242.183293] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.189686] b_state=0x0000002b, b_size=512
[  242.193916] device loop0 blocksize: 4096
[  242.197990] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.204292] b_state=0x0000002b, b_size=512
[  242.208521] device loop0 blocksize: 4096
[  242.212642] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.218887] b_state=0x0000002b, b_size=512
[  242.223101] device loop0 blocksize: 4096
[  242.227151] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.233410] b_state=0x0000002b, b_size=512
[  242.237640] device loop0 blocksize: 4096
[  242.241759] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.247985] b_state=0x0000002b, b_size=512
[  242.252269] device loop0 blocksize: 4096
[  242.256340] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.262616] b_state=0x0000002b, b_size=512
[  242.266844] device loop0 blocksize: 4096
[  242.266930] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.266937] b_state=0x0000002b, b_size=512
[  242.266943] device loop0 blocksize: 4096
[  242.266976] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.291952] b_state=0x0000002b, b_size=512
[  242.291962] device loop0 blocksize: 4096
[  242.291979] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.291986] b_state=0x0000002b, b_size=512
[  242.291991] device loop0 blocksize: 4096
[  242.292004] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.292026] b_state=0x0000002b, b_size=512
[  242.292032] device loop0 blocksize: 4096
[  242.292045] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.292050] b_state=0x0000002b, b_size=512
[  242.292056] device loop0 blocksize: 4096
[  242.292069] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.292076] b_state=0x0000002b, b_size=512
[  242.300523] device loop0 blocksize: 4096
[  242.300543] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.335836] b_state=0x0000002b, b_size=512
[  242.354614] device loop0 blocksize: 4096
[  242.354641] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.354651] b_state=0x0000002b, b_size=512
[  242.354659] device loop0 blocksize: 4096
[  242.354678] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.369226] b_state=0x0000002b, b_size=512
[  242.369235] device loop0 blocksize: 4096
[  242.369260] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.369268] b_state=0x0000002b, b_size=512
[  242.369276] device loop0 blocksize: 4096
[  242.369296] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.369303] b_state=0x0000002b, b_size=512
[  242.369311] device loop0 blocksize: 4096
[  242.369329] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.369339] b_state=0x0000002b, b_size=512
[  242.442230] device loop0 blocksize: 4096
[  242.446291] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.452569] b_state=0x0000002b, b_size=512
[  242.456799] device loop0 blocksize: 4096
[  242.460944] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.467170] b_state=0x0000002b, b_size=512
[  242.471468] device loop0 blocksize: 4096
[  242.475552] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.482136] b_state=0x0000002b, b_size=512
[  242.486377] device loop0 blocksize: 4096
[  242.490486] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.496714] b_state=0x0000002b, b_size=512
[  242.501006] device loop0 blocksize: 4096
[  242.505081] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.511367] b_state=0x0000002b, b_size=512
[  242.515596] device loop0 blocksize: 4096
[  242.519724] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.525951] b_state=0x0000002b, b_size=512
[  242.530224] device loop0 blocksize: 4096
[  242.534289] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.540544] b_state=0x0000002b, b_size=512
[  242.544788] device loop0 blocksize: 4096
[  242.548888] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.555114] b_state=0x0000002b, b_size=512
[  242.559408] device loop0 blocksize: 4096
[  242.563478] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.569741] b_state=0x0000002b, b_size=512
[  242.573981] device loop0 blocksize: 4096
[  242.578053] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.584319] b_state=0x0000002b, b_size=512
[  242.588600] device loop0 blocksize: 4096
[  242.592676] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.598933] b_state=0x0000002b, b_size=512
[  242.603163] device loop0 blocksize: 4096
07:48:47 executing program 0:
r0 = syz_open_pts(0xffffffffffffffff, 0x20000)
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000380))
setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000080)=0x1000, 0x4)
mkdir(&(0x7f0000000300)='./file0\x00', 0x0)
sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(&(0x7f0000000400)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0))
setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000004c0)="5d71f27e79ae18a9307d3ad987bde5f943e8ad91f720cfe21e05ed8b721e0ef4c45a65b156b13090e4e14239017021314f912f2b3015486cda955f5a3122ea923ca8d9a814a3a856c40199034a818c08e0ffabccebf4833b5d8ef14652d5036a99b4739144a86ad9dd49d944855696e16418860989b336e75e7ec57cfe4c1d4133138141764b0803495363c723da79eb5589650b51a885db7b430abbadafb126e512e742e2a64e610b96995b2cc2baa14ef6f7be6e0c227a41eced186639c0f680a42f5dbd22b788e7069f27d5327bb16079780164da906093", 0xd9)
r1 = socket(0x10, 0x2, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r2=>0x0, <r3=>0x0}, &(0x7f0000cab000)=0xc)
chown(&(0x7f00000001c0)='./file0\x00', r2, r3)
chdir(&(0x7f0000000340)='./file0\x00')
getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={<r4=>0x0}, &(0x7f0000000200)=0x8)
getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000240)={r4, 0x3}, &(0x7f00000003c0)=0x8)
symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00')
sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000900)={&(0x7f00000002c0), 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB="7000fddb666b000000000000030000000000"], 0x1}}, 0x10)
clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f00000008c0), 0xffffffffffffffff)
lstat(&(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000680))
getpeername$inet6(0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000000c0)=0x1c)
r5 = perf_event_open(&(0x7f0000000740)={0x0, 0x70, 0x0, 0x0, 0x0, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x40000000004, 0x1, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffe00, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000700)}, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000880)=0x4)
ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000180)={'veth0_to_bridge\x00', 0x1})
flock(r5, 0x8)
flock(r0, 0x2)
socket$nl_generic(0x10, 0x3, 0x10)
fcntl$setsig(r0, 0xa, 0x24)
fcntl$setsig(0xffffffffffffffff, 0xa, 0x11)
open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
mknodat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x4, 0x1f)

07:48:47 executing program 1:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCGPTPEER(r0, 0x40045436, 0x1)

07:48:47 executing program 4:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2)
r2 = socket(0xa, 0x3, 0x8)
ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000180)={"627269646765300000010000001100"})
fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
ioctl$sock_netdev_private(r2, 0x89f7, &(0x7f00000003c0)="4d8ddf256131fe006a402c314a0f2abcbf9e2a30cffbec5daa72b5ad6ecd85b108dc5161e71ca6b69c2256c7faef64b99d4f663f145825879d9873bfafca7f557db4b58e08cde713a35624e2b0ec300033171586c7745aceeb1509d9450b2b25746414554e9beb8fba41e92e51d8a312fda70f8efc328300189fc1d06d271c66bd0370cfecb92c2b9ef2ede393b9a4b882756a000004bac81b77d3e20e26bc713935f88a8e29de35e5b7b0e99f46297bc1aa4ab215b4f4de8b328f19aeb2555f85bd6292210021c1d41554c697dd672bb4adcc8bbd7d91ab1fdf85a4cafa04d3ad76bef153723344a56c3305000c66d84d93dc0dc20b9a70a1")
socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000380))
kcmp(0x0, r3, 0xfffffffffffffff9, r2, r2)
syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0)
socket$bt_hidp(0x1f, 0x3, 0x6)
dup3(r2, r0, 0x0)

07:48:47 executing program 2:
r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000005880)='attr/keycreate\x00')
ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04)
ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "7b3177f4fc2eb04172d2a8fdd1c4c4cf144a23173b6605afb988de7e07195d78f75dd19a3782fb25bfe2566c845a0c58b40026e6f769649cdbff0000c400", "ee52c10d1e72a943ccff00000080991a0000725ade5543129bb000"})
ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1)

[  242.607243] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.613655] b_state=0x0000002b, b_size=512
[  242.617891] device loop0 blocksize: 4096
[  242.622022] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.628248] b_state=0x0000002b, b_size=512
[  242.632558] device loop0 blocksize: 4096
[  242.636633] __find_get_block_slow() failed. block=2, b_blocknr=16
[  242.644376] b_state=0x0000002b, b_size=512
[  242.648643] device loop0 blocksize: 1024
07:48:47 executing program 1:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_SET_IRQCHIP(r1, 0x8010aebb, 0x0)
r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x101000, 0x0)
syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000003000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000080)="263e670fc7ff0f05c401fc298600000000c4a2259014ef47df431367decb66b825000f00d00f01f8660f38817f00f79a00000000", 0x34}], 0x1, 0x1, &(0x7f0000000100), 0x0)

07:48:47 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00')
ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000040)=0x2ee90045)
r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
mmap$perf(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x1010, r1, 0x0)
ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb})
ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f00000000c0))

07:48:47 executing program 2:
unshare(0x20020000)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)="646576707473007668d27021730a4068612ec18805891d08b3586492591b8cc0d0f495328c214a43d15d556ca280198820d4620f878950b44df75d77a9b6c37d160c8775656724d92c8c9bbb2afe95b8a19a5641b73377df2fa9c58ee1efc58d1638ba22838be2f72afad2306194c7796946070b14d2c17a949d9d072aabead94565aca23870a2a19a3bb46fa0f1d7265b32f282bcc27475fbf5b159d6a91bbe63de418d945729932cac0286d10d00ef5af35984db46f275a18b5f9f65fe5b71b15cce6e08432081", 0x0, 0x0)
r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200000, 0x0)
ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0)
poll(0x0, 0x0, 0x400007f)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
rmdir(&(0x7f0000000580)='./file0\x00')

[  242.765404] bridge0: port 2(bridge_slave_1) entered disabled state
[  242.776136] bridge0: port 1(bridge_slave_0) entered disabled state
07:48:48 executing program 5:
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000880)={{{@in=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000980)=0xe8)
setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000b00)={0x1, 0xfffffffffffffffa}, 0x8)
r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000580)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0)
syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000240)=ANY=[])
ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x1)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0)
syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[])
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x5c000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]})
syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x0, 0x2)
r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vsock\x00', 0x0, 0x0)
openat(r1, &(0x7f0000000240)='./file0\x00', 0x80100, 0x48)
open$dir(&(0x7f0000000280)='./control/file0\x00', 0x0, 0x0)
setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000600)=0x5, 0x4)
getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0), 0x10)
write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18)
r2 = userfaultfd(0x0)
fcntl$getownex(r2, 0x10, &(0x7f0000000340)={0x0, <r3=>0x0})
setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000001c0), 0x4)
syz_open_procfs$namespace(r3, &(0x7f0000000380)='ns/cgroup\x00')
ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0)
getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000003c0)={<r4=>0x0, @in={{0x2, 0x4e23, @rand_addr=0xd3}}}, &(0x7f0000000480)=0x84)
getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000004c0)={r4, 0x2, 0x20}, &(0x7f0000000500)=0xc)
getrandom(&(0x7f0000000a80)=""/86, 0xffffffffffffff62, 0x3)

07:48:48 executing program 3:
r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2)
ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000040)={0x3, 0x0, @value})
ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="000005000180c200000e0180c20000038c88fc3c1274aaaaaaaaaaaaaaaaaaaaaaaac70b871c29e03a510d912660e9e2e4b9a9f1f2d035b8b0a12071bd09de0e2b0d60820e376418667d249d0cdaa66af6c874d2ab5433ac1285ff7f6072eabca740edde55dacb52cc5931a08894bd975f"])
ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x5)
fcntl$getown(r0, 0x9)

07:48:48 executing program 3:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xe, 0x24, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48)
r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0)
getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000600), &(0x7f0000000640)=0x4)
getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={<r1=>0x0, 0xa4, &(0x7f0000000200)=[@in={0x2, 0x4e22, @rand_addr=0x3}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0xffffffff, @local}, @in6={0xa, 0x4e24, 0xfffffffffffffff8, @loopback}, @in6={0xa, 0x4e20, 0x4, @empty, 0x7}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xa}}, @in={0x2, 0x4e24, @multicast1}]}, &(0x7f0000000140)=0x10)
getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000500)={r1, @in={{0x2, 0x4e22, @local}}, 0xffffffffffffff80, 0x76}, &(0x7f00000005c0)=0x90)
setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000002c0)={r1, @in={{0x2, 0x4e21, @multicast1}}, 0x805f, 0x9, 0x7fffffff, 0x8, 0x20}, 0x98)

07:48:48 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x40, 0x0)
write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000100)={0x13, 0x7, 0x1, {{0x6, 'ppp1-Y'}, 0x4}}, 0x13)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
close(r0)
ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="61c3"])
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, 0x0}], 0x1, 0x0, &(0x7f0000000400), 0x0)
r3 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x4, 0x2000)
getsockopt$inet_mreq(r3, 0x0, 0x23, &(0x7f0000000040)={@multicast2, @broadcast}, &(0x7f0000000140)=0x8)
r4 = add_key$keyring(0x0, &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe)
keyctl$link(0x8, r4, 0x0)
ioctl$KVM_NMI(r2, 0xae9a)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil})
ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)=0xffff)
prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000580)={&(0x7f000000b000/0x2000)=nil, &(0x7f0000002000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000001000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f000000b000/0x1000)=nil, &(0x7f000000a000/0x2000)=nil, &(0x7f000000e000/0x2000)=nil, &(0x7f000000b000/0x2000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000017000/0x1000)=nil, &(0x7f0000000500), 0x0, r1}, 0x68)
mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x1012, 0xffffffffffffffff, 0x0)
bind$bt_l2cap(r3, &(0x7f0000000180)={0x1f, 0x7fffffff, {0x1, 0x582, 0x0, 0x800000000, 0xfffffffffffffbff, 0x4}, 0x0, 0x6}, 0xe)

07:48:48 executing program 0:
pipe2$9p(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff}, 0x0)
r2 = fcntl$dupfd(r0, 0x406, r1)
ioctl$KVM_SET_PIT2(r2, 0x4070aea0, &(0x7f0000000040)={[{0x7, 0x7, 0xaa2, 0x7f, 0x92, 0x8, 0x0, 0x7ff, 0x1f, 0x8, 0x6, 0x7, 0xffff}, {0x0, 0x4, 0x1, 0x1c, 0x7, 0x7, 0xffffffffffffffe1, 0x10000, 0x8, 0x1, 0x9, 0x4, 0x10001}, {0x7fff, 0x10001, 0x8, 0xa4, 0x9, 0x400, 0x2, 0x800, 0x7, 0x5, 0x8001, 0x9, 0x7}]})
mkdir(&(0x7f0000000100)='./file0\x00', 0x0)
dup2(r0, r1)
close(r0)
socket$vsock_dgram(0x28, 0x2, 0x0)
mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000700)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}})

07:48:48 executing program 1:
io_setup(0x5, &(0x7f0000000100)=<r0=>0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000006200)={'vcan0\x00', <r2=>0x0})
sendmsg$nl_route_sched(r1, &(0x7f0000006380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000006340)={&(0x7f0000000180)=ANY=[@ANYBLOB="e40000002800200028bd7000fedbdf2500000000", @ANYRES32=r2, @ANYBLOB="0900000010000a00060007000c000100686673630000000064000200100003005c0000000004000040000000100003002f1f000004000000010000001000010008000000010000800605000010000300050000000100000000f0ffff100001000000010001040000f7ffffff100002000400000072050000090000000800010061746d002c00020008000400f1fff3ff08000800000000000000010043fc2852204fbe05033f2df0f1fd3f0099", @ANYRES32=r1, @ANYBLOB="080004000500f3ff08000100", @ANYRES32=r1, @ANYBLOB="08000100647272000c00020008000100060000000800050002000000"], 0xe4}, 0x1, 0x0, 0x0, 0x40}, 0x4)
io_submit(r0, 0x1, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}])
r3 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x800)
getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000080), &(0x7f00000000c0)=0x4)

[  243.057056] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size.
07:48:48 executing program 5:
r0 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f00000000c0)=0x1c, 0x80800)
getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000100), &(0x7f00000001c0)=0x4)
r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x100000001, 0x8400)
openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0)
mknod(&(0x7f0000000300)='./file0/file0\x00', 0x8203, 0x2)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x0)
ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000280)=0x47)
r2 = socket(0x10, 0x2, 0xc)
write(r2, &(0x7f0000000040)="1f000000010101000100feff06110000f30501000800010001736759365742", 0x1f)
ioctl$TCSETA(r1, 0x5406, &(0x7f0000000200)={0x2, 0x180000000, 0x0, 0x3, 0x8, 0x9, 0x22, 0x100000000, 0x7, 0x6})
openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x10)

07:48:48 executing program 3:
r0 = socket$inet6(0xa, 0x803, 0x3)
getsockopt(r0, 0x6, 0x6, &(0x7f00000001c0)=""/177, &(0x7f0000000140)=0xb1)
r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xfff, 0x0)
bind$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x6, {0x100000000, 0x3, 0x6, 0x100000000, 0xffff, 0x3ff}, 0x1}, 0xe)
ioctl(r1, 0x5000008912, &(0x7f0000000180)="0a5c2d023c126285718070")
syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x21, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x140]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f0000000100)={0x0, 0x2, [0x0, 0xad4]})

07:48:48 executing program 1:
r0 = open(&(0x7f0000000000)='./file0\x00', 0x8040, 0x0)
acct(&(0x7f0000000140)='./file0\x00')
write$eventfd(r0, &(0x7f0000000040)=0x6b2d28f0, 0x8)
ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200))
acct(0x0)
ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)=<r1=>0x0)
setxattr$security_evm(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@sha1={0x1, "671366ad48f274eb223d4cf0d41eb185a04b0e0e"}, 0x15, 0x1)
r2 = gettid()
kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f00000000c0)={r0, r0, 0x100000000})

[  243.266060] dccp_invalid_packet: P.Data Offset(68) too large
[  243.316089] audit: type=1804 audit(1543736928.467:31): pid=7729 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir429992348/syzkaller.7oEmQK/12/file0" dev="sda1" ino=16539 res=1
[  243.349710] netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'.
07:48:48 executing program 3:
syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @dev}, @icmp=@parameter_prob={0xc, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x5c}, @dev}}}}}}, &(0x7f0000000140))
r0 = socket$bt_rfcomm(0x1f, 0x1, 0x3)
r1 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0)
sendfile(r0, r1, &(0x7f0000000080)=0x1a, 0x1)

[  243.358580] netlink: 4 bytes leftover after parsing attributes in process `syz-executor5'.
[  243.359229] Process accounting resumed
[  243.370554] netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'.
[  243.380244] netlink: 4 bytes leftover after parsing attributes in process `syz-executor5'.
07:48:48 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = epoll_create1(0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x30000004})
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000939ff4)={0x2000201f})
r3 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2)
write$P9_RMKNOD(r3, &(0x7f0000000080)={0x14}, 0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
sendfile(r1, r0, &(0x7f0000000000), 0x1)
ioctl$int_in(r3, 0x80000000005001, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)

[  243.407540] audit: type=1804 audit(1543736928.557:32): pid=7729 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir429992348/syzkaller.7oEmQK/12/file0" dev="sda1" ino=16539 res=1
[  243.431208] Process accounting resumed
07:48:48 executing program 2:
unshare(0x20020000)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)="646576707473007668d27021730a4068612ec18805891d08b3586492591b8cc0d0f495328c214a43d15d556ca280198820d4620f878950b44df75d77a9b6c37d160c8775656724d92c8c9bbb2afe95b8a19a5641b73377df2fa9c58ee1efc58d1638ba22838be2f72afad2306194c7796946070b14d2c17a949d9d072aabead94565aca23870a2a19a3bb46fa0f1d7265b32f282bcc27475fbf5b159d6a91bbe63de418d945729932cac0286d10d00ef5af35984db46f275a18b5f9f65fe5b71b15cce6e08432081", 0x0, 0x0)
r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200000, 0x0)
ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0)
poll(0x0, 0x0, 0x400007f)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
rmdir(&(0x7f0000000580)='./file0\x00')

07:48:48 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000203010002000270fff8", 0x16}], 0x0, 0x0)
r2 = dup2(r1, r0)
getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000100)={<r3=>0x0, 0x7}, &(0x7f00000011c0)=0x8)
ioctl$EXT4_IOC_RESIZE_FS(r1, 0x40086610, &(0x7f0000001280)=0x401)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000001200)={r3, 0x5d}, &(0x7f0000001240)=0x8)
r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0)
read$FUSE(r4, &(0x7f00000001c0), 0x1000)
socket$unix(0x1, 0xed6480babd87dd0b, 0x0)
r5 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x2)
ioctl$int_in(r5, 0x800000c004500a, &(0x7f0000000040))
write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f00000000c0)={0xffffffffffffffd3, 0x5, 0x100000000000000, {0x0, 0x0, 0x0, 0xb00020000000000}}, 0xfffffefd)
mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14)
dup2(r0, r5)

07:48:48 executing program 1:
r0 = open(&(0x7f0000000000)='./file0\x00', 0x8040, 0x0)
acct(&(0x7f0000000140)='./file0\x00')
write$eventfd(r0, &(0x7f0000000040)=0x6b2d28f0, 0x8)
ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200))
acct(0x0)
ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)=<r1=>0x0)
setxattr$security_evm(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@sha1={0x1, "671366ad48f274eb223d4cf0d41eb185a04b0e0e"}, 0x15, 0x1)
r2 = gettid()
kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f00000000c0)={r0, r0, 0x100000000})

07:48:48 executing program 4:
r0 = open(&(0x7f0000000000)='./file0\x00', 0x8040, 0x0)
acct(&(0x7f0000000140)='./file0\x00')
write$eventfd(r0, &(0x7f0000000040)=0x6b2d28f0, 0x8)
ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200))
acct(0x0)
ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)=<r1=>0x0)
setxattr$security_evm(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@sha1={0x1, "671366ad48f274eb223d4cf0d41eb185a04b0e0e"}, 0x15, 0x1)
r2 = gettid()
kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f00000000c0)={r0, r0, 0x100000000})

[  243.740623] audit: type=1804 audit(1543736928.897:33): pid=7752 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir457924292/syzkaller.MwWDC1/8/file0" dev="sda1" ino=16539 res=1
[  243.741555] Process accounting resumed
[  243.773157] Process accounting resumed
07:48:48 executing program 4:
r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0)
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x400000000000072, 0xffffffffffffffff, 0x0)
getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, &(0x7f0000001a00)=0xffffff00)
r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x400000, 0x0)
ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0)

[  243.860591] FAT-fs (loop5): bogus sectors per cluster 3
[  243.881318] audit: type=1804 audit(1543736928.917:34): pid=7755 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir429992348/syzkaller.7oEmQK/13/file0" dev="sda1" ino=16555 res=1
07:48:49 executing program 0:
r0 = open(&(0x7f0000000040)='./file0\x00', 0x121000, 0x1)
setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000001c0)={@in={{0x2, 0x4e22, @loopback}}, 0x5d00, 0x400, 0x1, "1b6a2d7039a834ffff3a52346c06baff2f2268139d5a9933b604ed18d8d74a458246358270f4a1ef4c9df6017655b3b145a37a852e9da87ea476bf3db3a6cbe82785e197cf54f14a187bd9d5f0f2a6d3"}, 0xd8)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x4e24, 0xb48e, @ipv4={[], [], @empty}, 0x5}}, 0x1, 0x6, 0x0, "3c52a71a9a1f8aa94a75308b604b8bf65ce7c6a33180024c96291620c28ff440bfcceb578284c3e8919e995ba0baa0ab8e814e46c5d6012ccfbdfb8c5ff1faed6a14caafb2e5b9942cf0e8b444932c50"}, 0xd8)
r2 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0)
ioctl$LOOP_SET_CAPACITY(r2, 0x1265)

07:48:49 executing program 1:
pipe(&(0x7f0000bbc000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f0000000140)={{0x9, 0x2}, 0x1, 0xfffffffffffff801, 0xffffffff00000000, {0x401, 0x9}, 0x6, 0xfff})
rt_sigprocmask(0x0, &(0x7f0000072ff8)={0x7fffffff}, &(0x7f00000000c0), 0x8)
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)=ANY=[])
fcntl$setstatus(r0, 0x4, 0x2000)
r3 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r3, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
sendfile(r2, r3, &(0x7f00000002c0), 0x9)
setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb)
setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0)
stat(&(0x7f0000000680)='./file0\x00', &(0x7f0000000740))
sendto$inet(r3, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty=0xe000000}, 0x6)

07:48:49 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video35\x00', 0x2, 0x0)
ioctl$VIDIOC_DQEVENT(r0, 0xc0045878, 0x0)
r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8a0f, 0x2)
ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000040))
ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0x980914})

07:48:49 executing program 5:
pipe(&(0x7f00000006c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
rt_sigprocmask(0x0, &(0x7f0000072ff8)={0x7fffffff}, &(0x7f00000000c0), 0x8)
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)=ANY=[])
fcntl$setstatus(r0, 0x4, 0x0)
r3 = socket$inet(0x2, 0x4000000000000001, 0x0)
r4 = open(&(0x7f00000004c0)='./file0/file0\x00', 0xa800, 0xe6)
bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r3, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb)
setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0)
stat(&(0x7f0000000680)='./file0\x00', &(0x7f0000000740))
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x1, "a19babd1a8a19148"})
writev(r3, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1)
sendmsg(r3, &(0x7f0000000700)={&(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000002600)}, 0x0)
getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000540)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000580)=0x18)
setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10)
exit_group(0x1)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0)
setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000200)='htcp\x00', 0x5)
sendto$inet(r3, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty=0xe000000}, 0x6)
dup2(r1, 0xffffffffffffffff)
io_setup(0x2, &(0x7f0000000100))
setsockopt$inet6_tcp_int(r1, 0x6, 0x3, &(0x7f0000000480), 0x4)
setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4)
syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00')
sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x0, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x35e}]}, 0x24}, 0x1, 0x0, 0x0, 0x3bc6d0a49ed2cd65}, 0x0)

[  243.915161] FAT-fs (loop5): Can't find a valid FAT filesystem
07:48:49 executing program 4:
syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0xffffffffffffffff, 0x2)
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0)
getpeername$packet(0xffffffffffffffff, 0x0, 0x0)
mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0)
openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x390, 0xfffffffffffffffb)
fcntl$getownex(0xffffffffffffffff, 0x10, 0x0)

[  244.068810] dns_resolver: Unsupported server list version (0)
07:48:49 executing program 0:
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x400, 0x0)
r0 = socket$inet(0x2, 0x801, 0x3)
bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000001180)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10)

[  244.116980] dns_resolver: Unsupported server list version (0)
07:48:49 executing program 3:
r0 = socket$inet6(0xa, 0x3, 0x6)
ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070")
r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x0, 0x0)
ioctl$TCSBRKP(r1, 0x7b9, 0x710003)
getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000000)={<r2=>0x0, 0x7, 0x2, [0xfff, 0xc5]}, &(0x7f0000000040)=0xc)
getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000080)={r2, 0x1c, "e3801ad94d3a6575d8d3d4fddea860365e2059be32ada5716035d971"}, &(0x7f00000000c0)=0x24)

07:48:49 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000140), 0x4)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$vsock_stream(0x28, 0x1, 0x0)
r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x400000, 0x0)
ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f0000000240)={0x3, 0x1, [0x2, 0x2, 0x2f37874e, 0x1, 0xffffffffffffff4f, 0xffffffffffff8000, 0x2, 0x5]})
getsockopt$sock_buf(r0, 0x1, 0x1f, &(0x7f0000000040)=""/253, &(0x7f0000000180)=0xfffffffffffffc70)

07:48:49 executing program 1:
mkdir(&(0x7f0000000100)='./file0\x00', 0x0)
mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0)
r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0)
r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x24200, 0x0)
r2 = getpgrp(0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@dev, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000840)=0xe8)
lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, <r4=>0x0})
ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000940)=<r5=>0x0)
lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, <r6=>0x0})
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40)={0x0, 0x0, <r7=>0x0}, &(0x7f0000000a80)=0xc)
ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000ac0)=<r8=>0x0)
lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r9=>0x0})
r10 = getegid()
getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000bc0)={<r11=>0x0}, &(0x7f0000000c00)=0xc)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40)={0x0, <r12=>0x0}, &(0x7f0000000c80)=0xc)
getgroups(0x1, &(0x7f0000000cc0)=[<r13=>0xffffffffffffffff])
r14 = fcntl$getown(r0, 0x9)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d00)={{{@in6=@ipv4={[], [], @broadcast}, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r15=>0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000000e00)=0xe8)
getresgid(&(0x7f0000000e40)=<r16=>0x0, &(0x7f0000000e80), &(0x7f0000000ec0))
sendmsg$unix(r1, &(0x7f0000000fc0)={&(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000006c0)=[{&(0x7f0000000380)="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", 0xfb}, {&(0x7f0000000140)="44e760f0d16c752ac2cec7c8f13dd3870d283dc242c9b403632de7fda47db4c2d447f59131f5fd666f9c2b3457367a661a8e662c928ab7dde598c4d23c", 0x3d}, {&(0x7f0000000480)="7179a5dfdcea8a8c63b01a2717150206cfaa242e16420dc147b92fcfcd083e5e951f8e67a747cfc931ab898c4e921aac7e4ef8653d9a2e6f17ed63e892dd875fd0a7e0d3c956708b78f416376c440499b5", 0x51}, {&(0x7f0000000500)="cbf42368ca02dca5057474a6a74e5b0529a91169b242c0a609cad4ff96930d04bb895c2ba1387e072322ef45c85b85259c2a93f3dd99d20df5dde84a3c24595977f48cb5be902240079e4dcf78e68cd537810bf57e6f3a26aea08a63323d1bd8560da1c0", 0x64}, {&(0x7f0000000580)="51c524cc649919c6bc3c4eebe8114e1d9fe6bc465b43679780a487694ae2c2380287d0b50bf33617b8693f3d9620c9adb821d9b865b9af873c060995c61452d63f57ad233085f41cb1cc191ba84ce1a4e70ef194ccba610bb082de95e7be0abf9d63495bc001d160d894bc7111dff7c074773fce0cf9feaae84caf3a5de0eaf21b9d95674cabb77c67c82aeaa49760f19da9c7fce96a03dd5d1dcb5c7ae9297ea9f74c218f4c0b318e0b9c9c8f65a3bf42fbb449337a2173c9807155c83fc08d8bca3a85be29bec1f053c221bc1aead24e713818818d4de05cc9c27a0dfad109efbe6f436ac99eaf1f8befc15091ca48b379cc", 0xf3}, {&(0x7f0000000680)="dab4ca1359481f6bf7e76967760d995b6f7e4a4d", 0x14}], 0x6, &(0x7f0000000f00)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @cred={0x20, 0x1, 0x2, r11, r12, r13}, @cred={0x20, 0x1, 0x2, r14, r15, r16}], 0xa0, 0x840}, 0x20000800)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, <r17=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200)
getdents64(r0, &(0x7f0000000180)=""/112, 0x70)
getdents64(r0, &(0x7f00000000c0)=""/61, 0x3d)
bind(r17, &(0x7f0000000240)=@vsock={0x28, 0x0, 0xffffffff}, 0x80)

07:48:49 executing program 4:
unshare(0x8000400)
r0 = socket$inet6(0xa, 0x803, 0x3)
ioctl(r0, 0x1000008916, &(0x7f0000000180)="0a5c2d023c126285718070")
r1 = socket$packet(0x11, 0xffffffffffffffff, 0x300)
setsockopt$packet_int(r1, 0x107, 0x13, &(0x7f0000000040), 0x4)

07:48:49 executing program 3:
pipe(&(0x7f00000002c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r2, &(0x7f0000000000)={0xa, 0x2}, 0x1c)
sendto$inet6(r2, &(0x7f00000001c0), 0x60f, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c)
splice(r2, 0x0, r1, 0x0, 0x40000ab11, 0x0)
getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={<r3=>0x0, 0xffffffff00000001, 0x1, 0x7ff, 0x1f, 0x8}, &(0x7f0000000080)=0x14)
setns(r1, 0x10000000)
getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000000c0)={<r4=>0x0}, &(0x7f0000000100)=0x8)
getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000140)={r3, 0x44b6, 0xfffffffffffffff9, 0x101, 0x401, 0x8, 0x2, 0x4, {r4, @in6={{0xa, 0x4e22, 0x1, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xa}}, 0xfffffffffffffffa}}, 0x7ff, 0x81, 0x8, 0x7fff, 0xffffffffffff8000}}, &(0x7f0000000200)=0xb0)
setsockopt$inet_opts(r0, 0x0, 0x2ccaa056dde87361, &(0x7f0000000300)="a1d324c1bdd63581247f670a37ed99d8ce7ca09190ab562ce7322d93f7f8e4a64e5466206109201a858614bf01aa708b7b940d99afa7f0cb9fa88ed486c825d498f44186684e791ce8befce60c6e2700a05512c1410c88305d7928913f4ad5751967588b2aaad89ebfe332600109f5ef6b1a1c15548025b80238929f9aee06ba08750cc139d8e5595f95d43d66a9d4c74e", 0x91)

07:48:49 executing program 5:
r0 = syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000300)={{0x0, 0x3, 0x0, 0x0, 0x5}, 0x0, 0x0, 'id1\x00', 'timer1\x00'})

07:48:49 executing program 0:
syz_mount_image$vfat(&(0x7f0000001680)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000dfff, 0x1, &(0x7f0000000040)=[{&(0x7f00000016c0)="eb64c86d4f66732e66617400020441000500077008f8", 0x16}], 0x0, 0x0)
r0 = socket$inet6(0xa, 0x0, 0x0)
connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, 0x1c)
setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, 0x0, 0xfffffffffffffdee)
mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000600)="0100", 0x1ff)
sync()
mknod(&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0)
write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
io_setup(0x9, &(0x7f00000002c0))
r1 = syz_open_dev$midi(&(0x7f0000000300)='/dev/midi#\x00', 0x200, 0x200000)
io_cancel(0x0, 0x0, 0x0)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={"6902000080009a568df98000"})
sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000200), 0xc, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_deladdr={0x18, 0x15, 0x101}, 0x18}}, 0x0)
sched_setaffinity(0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
utime(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000540)={0x0, 0x1})
ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f0000000000)={0x1, 0x4, 0x3})
umount2(&(0x7f0000000340)='./file0\x00', 0x0)
syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1)
lstat(&(0x7f00000008c0)='./file0/file0\x00', &(0x7f0000000d80))
fcntl$getownex(0xffffffffffffffff, 0x10, 0x0)
stat(&(0x7f0000000f00)='./file0/file1\x00', &(0x7f0000000f40))

07:48:49 executing program 5:
bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x11}, 0x10)
r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000540)=@security={'security\x00', 0xe, 0x4, 0x408, 0x128, 0x128, 0x128, 0x220, 0x0, 0x370, 0x370, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000040), {[{{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x3, 0x3}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x5, [0x9, 0x8, 0x1, 0x10001, 0x10000, 0x1], 0x1, 0x1, 0x101}, {0x3, [0x7977, 0x2, 0x3, 0x8, 0x7, 0x6], 0x0, 0x5, 0x1f}}}}, {{@ip={@multicast1, @loopback, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'ifb0\x00', {0xff}, {}, 0x89, 0x3, 0x20}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0xe9, 0x8c, 0x20, 0x558, 0x3, 0x39f6], 0x6, 0x52c}, {0x8, [0x1, 0x82a2, 0x5, 0x40000000, 0x8, 0x8], 0x4, 0xffffffffffffff80, 0x2}}}}, {{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@unspec=@pkttype={0x28, 'pkttype\x00', 0x0, {0x0, 0x7}}, @common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x240, 0x800}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x9, [0x20000, 0x2, 0x6, 0x400, 0x40, 0x101], 0x1ff, 0x4, 0x8}, {0x8, [0x7, 0x8, 0x5, 0x7, 0x9000000000, 0x20], 0x4c7, 0x7, 0x7}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x468)

07:48:49 executing program 4:
perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0)
readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/1, 0x1}], 0x20000000000000e4)
r1 = gettid()
ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f00000003c0)={0x9, &(0x7f0000000280)=[{0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @local}]})
write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x7b69}, 0x2)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000280)}}, &(0x7f0000000140))
syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x0, 0x2)
close(r0)
timer_settime(0x0, 0x1, &(0x7f0000000200)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f00000000c0))
tkill(r1, 0x1104400000016)

07:48:49 executing program 3:
r0 = socket$inet(0x10, 0x3, 0xc)
sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0)
sendmsg(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000001d40)=[{&(0x7f0000001ac0)="be657b9369aa2d917c869d7828b0efcecd4b6122358a03fcc0a29ab59b4343fa368015e015322318c53c8e027b909b2fbf", 0x2ed}, {&(0x7f0000001b00)="8a09d12ee6f09b9ccf0a556d63d08a28d98a258831b7d524763125c8da22845447faa72706f3df7a6152ec1b563c245a7ec68cca1855244ea9a997613e5e94a6a4c221366d32020f9dee6cc7d1e1c03e4f800f57a9c4eb88803be79fb5885490964245f8d85575c39c719fa8aad18d3572de84903b9a272b69f43d212be3bb763d30f8c322ca81d9f71ca71b62b8ca5c5a5519a6451a40723876d44636978339fa4d73f72d5786819d700231026b759da38e55f0c8ad30abb5ca7c479c984d59d949941cf9298153cc8ade4dab"}, {&(0x7f0000001c00)="b07c88f858447499aa27aea015cee210fb731abbf2f7602e1032940a75e7cdef9488a543bd2086eef6f0cbc10bb79f67e27a0817534ff9dbc54860de3138a1e2db0b43ec26a9a306b83d85410234c9de95c9ed6b42392bc2e403407a7d353d31cf60f5d8ff073505f711d9f730dc"}, {&(0x7f0000001c80)="88029203dc9ea207cee98ebcf35c4ded5b4d250e36a1e0a5b168d2c766f8aed7b1d570885acc4dcb1866bae71bd87e9596badba8a7e180f41690e998abebc19e32d391f701b6b02840d9999f04e708cddb8f38fa08731e439463f7d5d20271a227c08f22c37cad1d3fff3fcfff3e59cb15c797fb4ffbca1fb41933b5cf1c624f70cceb42920307f80077cb9bffcafddd74aa1508dcd3c0ddd45d8c"}], 0x0, 0x0, 0x326}, 0x0)
getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000100)=0xe8)
stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getresuid(&(0x7f0000000540)=<r3=>0x0, &(0x7f0000000580), &(0x7f00000005c0)=<r4=>0x0)
mount$bpf(0x0, &(0x7f0000001840)='./file0\x00', &(0x7f0000001880)='bpf\x00', 0x800000, &(0x7f00000018c0)={[{@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x10000}}, {@mode={'mode', 0x3d, 0x1f82}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x3f}}, {@mode={'mode', 0x3d, 0xffffffffffffff01}}], [{@smackfsfloor={'smackfsfloor', 0x3d, '\\-cgroup(wlan0,$eth0'}}, {@dont_measure='dont_measure'}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@hash='hash'}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@uid_lt={'uid<', r3}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@smackfsdef={'smackfsdef', 0x3d, 'vboxnet1trustedvboxnet1'}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@uid_lt={'uid<', r3}}]})
lstat(&(0x7f0000000600)='./file0\x00', &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, <r5=>0x0})
syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x401, 0x3, &(0x7f0000000300)=[{&(0x7f00000006c0)="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", 0x1000, 0x2}, {&(0x7f0000000180)="c84f073b19a79aad3767c34479e6c27055c0a11940e370b4c32f40bef6acc71add88e3c471c2b3591dc74aaf76005a87a6e10e8a37553d3213e20a7ef6d6188c518a775aebc3d3602cbf59e86a8a93c29c8b26db55a4736ecfe230af4f3beff8cfa3278e5e30aad548bba137f134586492230a2349bd888d20998b5a0316cda074ca990ef2ca28f452022a8a9105ce06d8c98b3d4e6f0a1ecd3c982d1ecbc8ef6cb3dd5e3072a1f82d019101a00967c0f0d2c3fd04d561131ef0d67f9467140c807428c04895f64cdd1c138f0b03a0bb3c5e973ad9ac15601eb4050c477f6d4eb3a74e831e1ff1706698a7178881ac0f1e0816e5c2fea6fe484d", 0xfa, 0x9}, {&(0x7f0000000280)="3c2c75abfb74ad5252ce752b7c8a03ce0d9bcfcf3ff94cc50b1de40f7d95680a708d607ad9909809e31aa719828d72521a3fc15fe4534055877d10811e520264d5f43b8a", 0x44, 0xc2b}], 0x200f0a4, &(0x7f0000001740)={[{@suiddir='suiddir'}, {@quota_on='quota=on'}], [{@subj_type={'subj_type', 0x3d, 'vboxnet0'}}, {@fowner_lt={'fowner<', r1}}, {@fowner_lt={'fowner<', r2}}, {@uid_eq={'uid', 0x3d, r4}}, {@audit='audit'}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@obj_type={'obj_type', 0x3d, '}%['}}, {@uid_eq={'uid', 0x3d, r5}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@obj_user={'obj_user', 0x3d, '\\-cgroup(wlan0,$eth0'}}]})

07:48:49 executing program 2:
clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xff, 0x8000)
r2 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x2710, @host}, 0x10, 0x80000)
ioctl$LOOP_SET_FD(r1, 0x4c00, r2)
wait4(0x0, 0x0, 0x80000000, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0xe)
ptrace$cont(0x18, r0, 0x0, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x50})
modify_ldt$read_default(0x2, &(0x7f0000000140)=""/241, 0xf1)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000))
ptrace$cont(0x1f, r0, 0x0, 0x0)

07:48:49 executing program 5:
ioctl$VHOST_GET_FEATURES(0xffffffffffffffff, 0x80044dff, &(0x7f00000001c0))

07:48:49 executing program 1:
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)='tunl0\x00')
stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180))
getcwd(&(0x7f0000000ac0)=""/4096, 0x1000)
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x20, 0x20000)
sendto(r1, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0)
ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x769)
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff)
setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000980)="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", 0x10d)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200)={<r2=>0xffffffffffffffff}, 0x117, 0xf}}, 0x20)
write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x10000, @ipv4={[], [], @multicast1}, 0x4}, {0xa, 0x4e23, 0x101, @loopback, 0x3ff}, r2, 0x4}}, 0x48)
r3 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, &(0x7f0000000140)="bf288f885d8a1d787a5a1457f7575fcad426660d2b027109824ff6513a914e2d280cf5031342d1", 0x27, 0xffffffffffffffff)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x0)
openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x802, 0x0)
keyctl$assume_authority(0x10, r3)
ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0)
dup(0xffffffffffffffff)
ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, 0x0)
r4 = gettid()
sched_setparam(r4, 0x0)

[  244.866836] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'.
07:48:50 executing program 5:
r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0xffffffffffffffff, @ib={0x1b, 0x0, 0x0, {"2fb62ead497f5a31e067faacbc31c76f"}}}}, 0x90)
r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x1, 0x0)
ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f00000001c0)=r1)
write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x106, 0x5}}, 0x20)
io_setup(0x10000000, &(0x7f0000000280)=<r2=>0x0)
io_cancel(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x7, 0x2, r0, &(0x7f00000002c0)="26acb3e01d9e46553f615e670b476b2cac717c1e92e950f081c803b4d46193dcc19e196969bbc4000eef7e82215058f1065a147415883808e794f78f49f760c039ad1bd0c44acaa35420a8161d7411bc8b59005978cac8cac266278cfe807e0e499ad156275d0ea12d5bb34cec6d17ae94b6e3e4896c0c116a4f100e8b7e4d3648ae6ba42d1a23499ed0561930df4a20dde5e3b30a449e6db912648465d4f0dfe3413d6cfa3327c548a4d532eba53d6ff309e2ac2a13bf3341c888aa55d3cd5aa36126767f3a1b0dfd8aa5e20945976d5dda5c0ffa6070ca95521bcf11a79f648756a8aad8", 0xe5, 0x7ff, 0x0, 0x0, r1}, &(0x7f0000000400))
r3 = syz_open_dev$ndb(&(0x7f0000000200)='/dev/nbd#\x00', 0x0, 0x20000)
fcntl$getownex(r3, 0x10, &(0x7f0000000240))

07:48:50 executing program 2:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
prctl$PR_SET_UNALIGN(0x6, 0x1)
bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60)
ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000440)={0x20000000000001, 0x0, @pic={0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x3}})
r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680})
r4 = dup3(r1, 0xffffffffffffffff, 0x80000)
getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000080)={<r5=>0x0, @in6={{0xa, 0x4e21, 0x3615, @dev={0xfe, 0x80, [], 0x10}, 0x7}}}, &(0x7f0000000000)=0x84)
getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000140)={r5, 0x8000}, &(0x7f00000001c0)=0x8)
ioctl$KVM_RUN(r3, 0xae80, 0x0)

07:48:50 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = inotify_init1(0x0)
r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0)
getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000080)={<r3=>0x0, 0x2}, &(0x7f00000000c0)=0x8)
setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000100)={r3, 0x8}, 0x8)
fcntl$setown(r1, 0x8, 0xffffffffffffffff)
fcntl$getownex(r1, 0x10, &(0x7f000045fff8)={0x0, <r4=>0x0})
ptrace$setopts(0x4206, r4, 0x0, 0x0)
ptrace(0x4207, r4)
ptrace$getregset(0x4203, r4, 0x0, &(0x7f0000000000)={&(0x7f0000002280)=""/4096, 0x68})

07:48:50 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0)
r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440)='security.selinux\x00', &(0x7f0000000540)='system_u:object_r:man_t:s0\x00', 0x1b, 0x1)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0)
mkdir(&(0x7f0000000180)='./file1\x00', 0x0)
ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000600)={0x7f, 0xa1d, 0x8, 0x1, 0x2, 0x10000, 0x0, 0x1c, 0x7fff, 0x8, 0x9, 0x101})
ioctl$BLKTRACESTART(r1, 0x1274, 0x0)
mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x704b, &(0x7f0000000640)=ANY=[])
r2 = msgget(0x3, 0x208)
r3 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x7, 0x109000)
getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000640), &(0x7f0000000580)=0x4)
msgsnd(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="130000000000000096dfde599e3a629346d5cfc2e60a01a2e0b1c127d6bcb2fe5499ea387fb3347d503363ca4f522ea0276413adde6ee6f0f8e4951efee4f4bf923ff2d84bae2dab03dfd1772a37a529908fc7cfc3a1e11d9df27616889584811367cbbccfeb82cfe66d04b4b1ae12188e297c98b6e0120d81b4d119b540f321a6"], 0x89, 0x800)
syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000540), 0x820, &(0x7f00000005c0)=ANY=[@ANYBLOB="00020000000000000000"])
syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file1\x00', 0x6f, 0x0, &(0x7f00000001c0), 0x112000, &(0x7f0000000340)={[{@type={'type', 0x3d, "0b600558"}}, {@file_umask={'file_umask', 0x3d, 0x5}}, {@dir_umask={'dir_umask', 0x3d, 0x1}}, {@session={'session', 0x3d, 0xfffffffffffffffe}}, {@file_umask={'file_umask', 0x3d, 0x3ff}}], [{@mask={'mask', 0x3d, 'MAY_EXEC'}}]})
getpeername(0xffffffffffffffff, &(0x7f0000000240)=@xdp, &(0x7f0000000300)=0x39)
ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60)
ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffff9c})
getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xfffffffffffffe8e)

[  245.009913] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'.
07:48:50 executing program 1:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x2, 0x0)
write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00', "737978310000000000000000000000000000000200000057310f00000000000000000000000000170000220000000000000000000000000000000000001400", 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x11c)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x10000000000000)
r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/snapshot\x00', 0x80001, 0x0)
r3 = open(&(0x7f0000000100)='./file0\x00', 0x10000, 0x1)
setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000040)=0xaaf, 0x4)
poll(&(0x7f0000000080)=[{r1, 0x400}, {r0, 0x8248}, {r2, 0x1040}, {r2}, {0xffffffffffffffff, 0xa000}, {r2, 0x1}, {0xffffffffffffffff, 0x2000}, {r1}, {r1, 0x403}], 0x9, 0x1f)

[  245.202297] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  245.231106] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  245.297662] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  245.330780] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  245.363860] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  245.390759] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  245.405450] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  245.413086] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue
[  245.421254] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  245.428112] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  245.435327] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  245.442443] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[  245.452699] hid-generic 0000:0000:0000.0001: hidraw0: <UNKNOWN> HID v0.00 Device [syz1] on syx1
[  245.559035] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue
[  248.078603] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  251.088586] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  254.098606] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  257.108584] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  260.118583] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  263.128631] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  266.138611] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  269.148584] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  272.158602] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  275.168588] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  278.178586] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  281.188615] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  284.198589] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  287.208595] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  290.218585] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  293.228623] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  296.238593] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  299.248585] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  302.258589] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  305.268586] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  308.278599] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  311.288588] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  314.298593] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  317.309069] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  320.318592] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  323.328597] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  326.338585] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  329.348585] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  332.358598] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  335.368596] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  338.378594] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  341.388597] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  344.398584] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  347.408597] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  350.418601] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  353.428584] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  356.438586] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  359.448596] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  362.458585] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  365.468592] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  368.478667] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  371.488591] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  374.498586] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  377.508590] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  380.518598] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  383.528590] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  386.538595] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  389.548589] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  391.118727] INFO: task syz-executor0:7831 blocked for more than 140 seconds.
[  391.125955]       Not tainted 4.20.0-rc1-next-20181109+ #110
[  391.132080] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  391.140294] syz-executor0   D24560  7831   5939 0x00000004
[  391.145927] Call Trace:
[  391.148582]  __schedule+0x8cf/0x21d0
[  391.157704]  ? prepare_to_wait_event+0x39f/0xa10
[  391.162776]  ? __sched_text_start+0x8/0x8
[  391.166978]  ? _raw_spin_unlock_irqrestore+0x6d/0xd0
[  391.172374]  ? prepare_to_wait_event+0x39f/0xa10
[  391.177141]  ? prepare_to_wait_exclusive+0x480/0x480
[  391.182617]  ? __lock_is_held+0xb5/0x140
[  391.186818]  schedule+0xef/0x370
[  391.190519]  ? __schedule+0x21d0/0x21d0
[  391.194539]  ? wakeup_dirtytime_writeback+0x5e0/0x5e0
[  391.200139]  ? replenish_dl_entity.cold.55+0x36/0x36
[  391.205280]  ? __might_sleep+0x95/0x190
[  391.209561]  wb_wait_for_completion+0x1f9/0x2d0
[  391.214246]  ? block_dump___mark_inode_dirty+0x120/0x120
[  391.220066]  ? finish_wait+0x430/0x430
[  391.223984]  ? lock_acquire+0x1ed/0x520
[  391.227971]  sync_inodes_sb+0x33e/0x480
[  391.232245]  ? try_to_writeback_inodes_sb+0x70/0x70
[  391.237293]  ? iterate_supers+0xda/0x290
[  391.241629]  ? lock_downgrade+0x900/0x900
[  391.245796]  ? down_read+0x8d/0x120
[  391.249728]  ? __down_interruptible+0x700/0x700
[  391.254407]  sync_inodes_one_sb+0x59/0x70
[  391.258558]  iterate_supers+0x149/0x290
[  391.262811]  ? __ia32_sys_tee+0x2b0/0x2b0
[  391.266972]  ksys_sync+0xec/0x1e0
[  391.270715]  ? sync_filesystem+0x330/0x330
[  391.274994]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  391.280807]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  391.286217]  ? trace_hardirqs_off_caller+0x300/0x300
[  391.291589]  __ia32_sys_sync+0xe/0x20
[  391.295422]  do_syscall_64+0x1b9/0x820
[  391.299614]  ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe
[  391.304979]  ? syscall_return_slowpath+0x5e0/0x5e0
[  391.310184]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  391.315035]  ? trace_hardirqs_on_caller+0x310/0x310
[  391.320328]  ? prepare_exit_to_usermode+0x3b0/0x3b0
[  391.325346]  ? prepare_exit_to_usermode+0x291/0x3b0
[  391.330647]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  391.335506]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  391.340928] RIP: 0033:0x457569
[  391.344142] Code: Bad RIP value.
[  391.347503] RSP: 002b:00007efd962b8c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a2
[  391.355494] RAX: ffffffffffffffda RBX: 000000000072bfa8 RCX: 0000000000457569
[  391.363214] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[  391.370730] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000
[  391.378002] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efd962b96d4
[  391.385537] R13: 00000000004c3216 R14: 00000000004d8c98 R15: 00000000ffffffff
[  391.393076] INFO: task syz-executor0:7896 blocked for more than 140 seconds.
[  391.400545]       Not tainted 4.20.0-rc1-next-20181109+ #110
[  391.406337] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  391.414541] syz-executor0   D25280  7896   5939 0x00000004
[  391.420424] Call Trace:
[  391.423017]  __schedule+0x8cf/0x21d0
[  391.426732]  ? prepare_to_wait_event+0x39f/0xa10
[  391.431764]  ? __sched_text_start+0x8/0x8
[  391.435925]  ? _raw_spin_unlock_irqrestore+0x6d/0xd0
[  391.441415]  ? prepare_to_wait_event+0x39f/0xa10
[  391.446189]  ? prepare_to_wait_exclusive+0x480/0x480
[  391.451556]  ? __lock_is_held+0xb5/0x140
[  391.455631]  schedule+0xef/0x370
[  391.459365]  ? __schedule+0x21d0/0x21d0
[  391.463348]  ? wakeup_dirtytime_writeback+0x5e0/0x5e0
[  391.468881]  ? graph_lock+0x270/0x270
[  391.472686]  ? replenish_dl_entity.cold.55+0x36/0x36
[  391.477791]  ? __might_sleep+0x95/0x190
[  391.482066]  wb_wait_for_completion+0x1f9/0x2d0
[  391.486748]  ? block_dump___mark_inode_dirty+0x120/0x120
[  391.492455]  ? finish_wait+0x430/0x430
[  391.496347]  ? find_held_lock+0x36/0x1c0
[  391.500675]  ? lock_acquire+0x1ed/0x520
[  391.504657]  sync_inodes_sb+0x33e/0x480
[  391.508865]  ? try_to_writeback_inodes_sb+0x70/0x70
[  391.513881]  ? iterate_supers+0xda/0x290
[  391.517948]  ? lock_downgrade+0x900/0x900
[  391.522411]  ? down_read+0x8d/0x120
[  391.526046]  ? __down_interruptible+0x700/0x700
[  391.530998]  sync_inodes_one_sb+0x59/0x70
[  391.535149]  iterate_supers+0x149/0x290
[  391.539399]  ? __ia32_sys_tee+0x2b0/0x2b0
[  391.543557]  ksys_sync+0xec/0x1e0
[  391.547010]  ? sync_filesystem+0x330/0x330
[  391.551538]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  391.557094]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  391.562729]  ? trace_hardirqs_off_caller+0x300/0x300
[  391.567845]  __ia32_sys_sync+0xe/0x20
[  391.571895]  do_syscall_64+0x1b9/0x820
[  391.575794]  ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe
[  391.581440]  ? syscall_return_slowpath+0x5e0/0x5e0
[  391.586373]  ? trace_hardirqs_on_caller+0x310/0x310
[  391.591645]  ? prepare_exit_to_usermode+0x3b0/0x3b0
[  391.596733]  ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250
[  391.604206]  ? __switch_to_asm+0x40/0x70
[  391.608276]  ? __switch_to_asm+0x34/0x70
[  391.612700]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  391.617575]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  391.623032] RIP: 0033:0x457569
[  391.626237] Code: Bad RIP value.
[  391.629871] RSP: 002b:00007efd96296c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a2
[  391.637578] RAX: ffffffffffffffda RBX: 000000000072c048 RCX: 0000000000457569
[  391.645121] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[  391.652630] RBP: 000000000072c040 R08: 0000000000000000 R09: 0000000000000000
[  391.660150] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efd962976d4
[  391.667419] R13: 00000000004c3216 R14: 00000000004d8c98 R15: 00000000ffffffff
[  391.675071] 
[  391.675071] Showing all locks held in the system:
[  391.681845] 4 locks held by kworker/u4:0/7:
[  391.686175] 1 lock held by khungtaskd/1011:
[  391.690821]  #0: 00000000adb01b4a (rcu_read_lock){....}, at: debug_show_all_locks+0xd0/0x424
[  391.699715] 1 lock held by rsyslogd/5810:
[  391.703855]  #0: 00000000e066cb41 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1bb/0x200
[  391.712138] 2 locks held by getty/5900:
[  391.716103]  #0: 00000000052c5a39 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40
[  391.724621]  #1: 0000000082f22608 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80
[  391.733784] 2 locks held by getty/5901:
[  391.737748]  #0: 000000006da4ea48 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40
[  391.746273]  #1: 00000000e5be17af (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80
[  391.755386] 2 locks held by getty/5902:
[  391.759585]  #0: 00000000649e6cb6 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40
[  391.767829]  #1: 000000005f276664 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80
[  391.776942] 2 locks held by getty/5903:
[  391.781158]  #0: 000000009127cd9d (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40
[  391.789639]  #1: 00000000e81d450c (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80
[  391.798495] 2 locks held by getty/5904:
[  391.802750]  #0: 0000000045c3923b (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40
[  391.811244]  #1: 0000000071c9cc73 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80
[  391.820340] 2 locks held by getty/5905:
[  391.824308]  #0: 00000000d1d52c53 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40
[  391.832794]  #1: 00000000d9c93c4c (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80
[  391.841923] 2 locks held by getty/5906:
[  391.845888]  #0: 0000000075218c73 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40
[  391.854424]  #1: 000000007c1c1449 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80
[  391.863528] 1 lock held by syz-executor0/7831:
[  391.868113]  #0: 000000008f01ec5e (&fc->fs_type->s_umount_key#62){.+.+}, at: iterate_supers+0xe2/0x290
[  391.877914] 1 lock held by syz-executor0/7896:
[  391.882705]  #0: 000000008f01ec5e (&fc->fs_type->s_umount_key#62){.+.+}, at: iterate_supers+0xe2/0x290
[  391.892431] 
[  391.894062] =============================================
[  391.894062] 
[  391.901343] NMI backtrace for cpu 0
[  391.904972] CPU: 0 PID: 1011 Comm: khungtaskd Not tainted 4.20.0-rc1-next-20181109+ #110
[  391.913196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  391.922539] Call Trace:
[  391.925174]  dump_stack+0x244/0x39d
[  391.928803]  ? dump_stack_print_info.cold.1+0x20/0x20
[  391.934021]  ? check_preemption_disabled+0x48/0x280
[  391.939051]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  391.944594]  nmi_cpu_backtrace.cold.2+0x5c/0xa1
[  391.949303]  ? lapic_can_unplug_cpu.cold.27+0x3f/0x3f
[  391.954492]  nmi_trigger_cpumask_backtrace+0x1e8/0x22a
[  391.959774]  arch_trigger_cpumask_backtrace+0x14/0x20
[  391.964963]  watchdog+0xb4c/0x1060
[  391.968512]  ? hungtask_pm_notify+0xb0/0xb0
[  391.972857]  ? __kthread_parkme+0xce/0x1a0
[  391.977101]  ? _raw_spin_unlock_irqrestore+0x82/0xd0
[  391.982206]  ? _raw_spin_unlock_irqrestore+0x82/0xd0
[  391.987308]  ? lockdep_hardirqs_on+0x3bb/0x5b0
[  391.991896]  ? trace_hardirqs_on+0xbd/0x310
[  391.996256]  ? kasan_check_read+0x11/0x20
[  392.000401]  ? __kthread_parkme+0xce/0x1a0
[  392.004637]  ? trace_hardirqs_off_caller+0x300/0x300
[  392.009742]  ? __schedule+0x21d0/0x21d0
[  392.013714]  ? lockdep_init_map+0x9/0x10
[  392.017780]  ? _raw_spin_unlock_irqrestore+0x6d/0xd0
[  392.022904]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  392.028440]  ? __kthread_parkme+0xfb/0x1a0
[  392.032677]  ? hungtask_pm_notify+0xb0/0xb0
[  392.037000]  kthread+0x35a/0x440
[  392.040370]  ? kthread_stop+0x8f0/0x8f0
[  392.044349]  ret_from_fork+0x3a/0x50
[  392.048167] Sending NMI from CPU 0 to CPUs 1:
[  392.055184] INFO: NMI handler (nmi_cpu_backtrace_handler) took too long to run: 2.248 msecs
[  392.055706] NMI backtrace for cpu 1
[  392.055713] CPU: 1 PID: 7 Comm: kworker/u4:0 Not tainted 4.20.0-rc1-next-20181109+ #110
[  392.055720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  392.055724] Workqueue: writeback wb_workfn (flush-7:0)
[  392.055733] RIP: 0010:write_comp_data+0x4/0x70
[  392.055756] Code: 00 e9 a6 fc ff ff 4c 89 f7 e8 88 58 43 00 e9 6f fc ff ff e8 1e 38 c9 ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 55 48 89 e5 <65> 4c 8b 04 25 40 ee 01 00 65 8b 05 7c 45 82 7e a9 00 01 1f 00 75
[  392.055761] RSP: 0018:ffff8801d9ae5970 EFLAGS: 00000246
[  392.055768] RAX: 0000000000000000 RBX: ffff8801d9ae5bb0 RCX: ffffffff87cb45c0
[  392.055773] RDX: 0000000000000001 RSI: 000000000000003f RDI: 0000000000000007
[  392.055778] RBP: ffff8801d9ae5970 R08: ffff8801d9ada1c0 R09: ffffed003b5e5b67
[  392.055784] R10: ffffed003b5e5b67 R11: ffff8801daf2db3b R12: 1ffff1003b35cb34
[  392.055789] R13: 0000000000000001 R14: ffff8801b6858c82 R15: ffff8801d9ae5bc8
[  392.055794] FS:  0000000000000000(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000
[  392.055798] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  392.055804] CR2: ffffffffff600400 CR3: 00000001c2868000 CR4: 00000000001406e0
[  392.055809] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  392.055814] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  392.055817] Call Trace:
[  392.055821]  __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  392.055825]  xas_start+0x3a0/0x740
[  392.055828]  ? xas_pause+0x490/0x490
[  392.055831]  ? lock_acquire+0x1ed/0x520
[  392.055835]  ? find_get_entry+0x2e3/0x1120
[  392.055839]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  392.055843]  ? check_preemption_disabled+0x48/0x280
[  392.055847]  ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170
[  392.055851]  ? check_preemption_disabled+0x48/0x280
[  392.055855]  ? rcu_softirq_qs+0x20/0x20
[  392.055858]  xas_load+0x21/0x1e0
[  392.055861]  find_get_entry+0x3ca/0x1120
[  392.055865]  ? find_held_lock+0x36/0x1c0
[  392.055869]  ? mark_page_accessed+0xcaf/0x2040
[  392.055873]  ? filemap_map_pages+0x1a20/0x1a20
[  392.055876]  ? find_get_entry+0xa87/0x1120
[  392.055880]  ? lock_downgrade+0x900/0x900
[  392.055892]  ? check_preemption_disabled+0x48/0x280
[  392.055895]  ? kasan_check_read+0x11/0x20
[  392.055899]  ? rcu_read_unlock_special+0x370/0x370
[  392.055903]  ? find_get_entry+0xaae/0x1120
[  392.055907]  ? filemap_map_pages+0x1a20/0x1a20
[  392.055910]  ? mark_held_locks+0xc7/0x130
[  392.055915]  ? __bpf_trace_preemptirq_template+0x30/0x30
[  392.055918]  ? retint_kernel+0x2d/0x2d
[  392.055922]  ? graph_lock+0x270/0x270
[  392.055926]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  392.055929]  pagecache_get_page+0x12f/0xf00
[  392.055933]  ? add_to_page_cache_lru+0xdb0/0xdb0
[  392.055937]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  392.055941]  ? print_usage_bug+0xc0/0xc0
[  392.055945]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  392.055948]  ? __might_sleep+0x95/0x190
[  392.055952]  ? pagecache_get_page+0x2d8/0xf00
[  392.055955]  ? mark_held_locks+0xc7/0x130
[  392.055959]  ? lock_downgrade+0x900/0x900
[  392.055963]  ? __find_get_block+0x2f7/0xf10
[  392.055966]  ? __find_get_block+0x2f7/0xf10
[  392.055970]  ? lockdep_hardirqs_on+0x3bb/0x5b0
[  392.055974]  ? trace_hardirqs_on+0xbd/0x310
[  392.055978]  ? __getblk_gfp+0x3d3/0x1030
[  392.055981]  ? trace_hardirqs_off_caller+0x300/0x300
[  392.055986]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  392.055990]  ? check_preemption_disabled+0x48/0x280
[  392.055994]  __find_get_block+0x635/0xf10
[  392.055997]  ? try_to_free_buffers+0xd40/0xd40
[  392.056002]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  392.056005]  ? unlock_page+0x2c2/0x4c0
[  392.056009]  ? wake_up_page_bit+0x6f0/0x6f0
[  392.056013]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  392.056017]  ? init_page_buffers+0x433/0x570
[  392.056021]  ? __set_page_dirty_buffers+0x810/0x810
[  392.056024]  ? __getblk_gfp+0x56a/0x1030
[  392.056028]  ? __getblk_gfp+0x579/0x1030
[  392.056031]  __getblk_gfp+0x3d3/0x1030
[  392.056039]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  392.056043]  ? __find_get_block+0xf10/0xf10
[  392.056046]  ? mark_held_locks+0x130/0x130
[  392.056050]  ? graph_lock+0x270/0x270
[  392.056053]  ? graph_lock+0x270/0x270
[  392.056056]  ? check_usage+0x1aa/0x790
[  392.056060]  ? __save_stack_trace+0x7d/0xf0
[  392.056064]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  392.056068]  ? check_preemption_disabled+0x48/0x280
[  392.056072]  ? find_held_lock+0x36/0x1c0
[  392.056075]  ? lock_downgrade+0x900/0x900
[  392.056079]  ? graph_lock+0x270/0x270
[  392.056082]  ? submit_bio+0xba/0x460
[  392.056086]  __bread_gfp+0x2d/0x310
[  392.056089]  __fat_write_inode+0x347/0xb60
[  392.056093]  ? graph_lock+0x270/0x270
[  392.056096]  ? fat_calc_dir_size+0x2a0/0x2a0
[  392.056101]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  392.056105]  ? check_preemption_disabled+0x48/0x280
[  392.056108]  fat_write_inode+0x97/0x180
[  392.056130]  __writeback_single_inode+0xf4a/0x1650
[  392.056134]  ? __mark_inode_dirty+0x1500/0x1500
[  392.056138]  ? find_held_lock+0x36/0x1c0
[  392.056142]  ? find_held_lock+0x36/0x1c0
[  392.056146]  ? wbc_attach_and_unlock_inode+0x670/0xa30
[  392.056150]  ? lock_downgrade+0x900/0x900
[  392.056154]  ? find_held_lock+0x13f/0x1c0
[  392.056158]  ? kasan_check_read+0x11/0x20
[  392.056162]  ? do_raw_spin_unlock+0xa7/0x330
[  392.056166]  ? do_raw_spin_trylock+0x270/0x270
[  392.056170]  ? lock_downgrade+0x900/0x900
[  392.056174]  ? _raw_spin_unlock+0x2c/0x50
[  392.056178]  ? wbc_attach_and_unlock_inode+0x675/0xa30
[  392.056182]  ? do_raw_spin_trylock+0x270/0x270
[  392.056187]  ? __writeback_single_inode+0x1650/0x1650
[  392.056191]  writeback_sb_inodes+0x71f/0x1210
[  392.056206]  ? wbc_detach_inode+0x940/0x940
[  392.056209]  ? lock_release+0xa10/0xa10
[  392.056213]  ? down_read_trylock+0xda/0x140
[  392.056217]  ? trylock_super+0x22/0x110
[  392.056220]  ? downgrade_write+0x270/0x270
[  392.056223]  ? queue_io+0x3d8/0x800
[  392.056228]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  392.056232]  __writeback_inodes_wb+0x1b9/0x340
[  392.056236]  ? writeback_sb_inodes+0x1210/0x1210
[  392.056239]  ? __lock_is_held+0xb5/0x140
[  392.056243]  wb_writeback+0xa5d/0xfa0
[  392.056247]  ? writeback_inodes_wb.constprop.50+0x320/0x320
[  392.056251]  ? set_precision+0xe0/0xe0
[  392.056255]  ? __lock_acquire+0x62f/0x4c20
[  392.056259]  ? __sanitizer_cov_trace_switch+0x53/0x90
[  392.056262]  ? print_usage_bug+0xc0/0xc0
[  392.056266]  ? string+0x225/0x2d0
[  392.056269]  ? widen_string+0x2e0/0x2e0
[  392.056273]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  392.056277]  ? find_next_bit+0x104/0x130
[  392.056281]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  392.056284]  ? find_next_bit+0x104/0x130
[  392.056288]  ? cpumask_next+0x41/0x50
[  392.056292]  ? __sanitizer_cov_trace_cmp4+0x16/0x20
[  392.056296]  ? get_nr_dirty_inodes+0xd6/0x130
[  392.056300]  ? __local_bh_enable_ip+0x160/0x260
[  392.056303]  ? get_nr_dirty_pages+0x17c/0x1f0
[  392.056307]  ? _raw_spin_unlock_bh+0x30/0x40
[  392.056311]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  392.056316]  ? wb_split_bdi_pages.isra.33+0x134/0x1b0
[  392.056319]  ? wb_wait_for_completion+0x2d0/0x2d0
[  392.056323]  ? wb_workfn+0x51c/0x1780
[  392.056327]  ? __local_bh_enable_ip+0x160/0x260
[  392.056330]  wb_workfn+0xedf/0x1780
[  392.056334]  ? __lock_acquire+0x62f/0x4c20
[  392.056338]  ? inode_wait_for_writeback+0x40/0x40
[  392.056341]  ? mark_held_locks+0x130/0x130
[  392.056345]  ? lock_downgrade+0x900/0x900
[  392.056349]  ? lock_downgrade+0x900/0x900
[  392.056352]  ? trace_hardirqs_off+0xb8/0x310
[  392.056356]  ? kasan_check_read+0x11/0x20
[  392.056360]  ? do_raw_spin_unlock+0xa7/0x330
[  392.056363]  ? trace_hardirqs_on+0x310/0x310
[  392.056367]  ? do_raw_spin_trylock+0x270/0x270
[  392.056371]  ? lock_pin_lock+0x350/0x350
[  392.056375]  ? _raw_spin_unlock_irqrestore+0x6d/0xd0
[  392.056378]  ? try_to_wake_up+0x11c/0x1490
[  392.056383]  ? __perf_event_task_sched_out+0x33a/0x1ca0
[  392.056386]  ? graph_lock+0x270/0x270
[  392.056390]  ? debug_object_deactivate+0x2eb/0x450
[  392.056394]  ? lock_downgrade+0x900/0x900
[  392.056397]  ? find_held_lock+0x36/0x1c0
[  392.056401]  ? graph_lock+0x270/0x270
[  392.056405]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  392.056409]  ? check_preemption_disabled+0x48/0x280
[  392.056413]  ? __lock_is_held+0xb5/0x140
[  392.056416]  process_one_work+0xc8b/0x1c40
[  392.056420]  ? mark_held_locks+0x130/0x130
[  392.056424]  ? pwq_dec_nr_in_flight+0x4a0/0x4a0
[  392.056427]  ? __switch_to_asm+0x34/0x70
[  392.056431]  ? __switch_to_asm+0x34/0x70
[  392.056435]  ? __switch_to_asm+0x40/0x70
[  392.056438]  ? __switch_to_asm+0x34/0x70
[  392.056442]  ? __switch_to_asm+0x40/0x70
[  392.056445]  ? __switch_to_asm+0x34/0x70
[  392.056449]  ? __switch_to_asm+0x34/0x70
[  392.056452]  ? __switch_to_asm+0x40/0x70
[  392.056456]  ? __switch_to_asm+0x34/0x70
[  392.056460]  ? __switch_to_asm+0x40/0x70
[  392.056463]  ? __switch_to_asm+0x34/0x70
[  392.056467]  ? __switch_to_asm+0x40/0x70
[  392.056470]  ? __switch_to_asm+0x34/0x70
[  392.056474]  ? __sched_text_start+0x8/0x8
[  392.056477]  ? graph_lock+0x270/0x270
[  392.056481]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  392.056484]  ? native_iret+0x7/0x7
[  392.056488]  ? error_exit+0xb/0x20
[  392.056491]  ? find_held_lock+0x36/0x1c0
[  392.056495]  ? lock_acquire+0x1ed/0x520
[  392.056499]  ? worker_thread+0x3e0/0x1390
[  392.056502]  ? kasan_check_write+0x14/0x20
[  392.056506]  ? do_raw_spin_lock+0x14f/0x350
[  392.056509]  ? __schedule+0x21d0/0x21d0
[  392.056513]  ? rwlock_bug.part.2+0x90/0x90
[  392.056517]  ? trace_hardirqs_on+0x310/0x310
[  392.056521]  worker_thread+0x17f/0x1390
[  392.056525]  ? preempt_notifier_register+0x200/0x200
[  392.056528]  ? process_one_work+0x1c40/0x1c40
[  392.056532]  ? __schedule+0x8d7/0x21d0
[  392.056536]  ? __sched_text_start+0x8/0x8
[  392.056539]  ? __sched_text_start+0x8/0x8
[  392.056543]  ? __kthread_parkme+0xce/0x1a0
[  392.056547]  ? _raw_spin_unlock_irqrestore+0x82/0xd0
[  392.056551]  ? _raw_spin_unlock_irqrestore+0x82/0xd0
[  392.056555]  ? lockdep_hardirqs_on+0x3bb/0x5b0
[  392.056558]  ? trace_hardirqs_on+0xbd/0x310
[  392.056562]  ? kasan_check_read+0x11/0x20
[  392.056566]  ? __kthread_parkme+0xce/0x1a0
[  392.056570]  ? trace_hardirqs_off_caller+0x300/0x300
[  392.056573]  ? __schedule+0x21d0/0x21d0
[  392.056577]  ? _raw_spin_unlock_irqrestore+0x6d/0xd0
[  392.056582]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  392.056585]  ? __kthread_parkme+0xfb/0x1a0
[  392.056589]  ? process_one_work+0x1c40/0x1c40
[  392.056592]  kthread+0x35a/0x440
[  392.056596]  ? kthread_stop+0x8f0/0x8f0
[  392.056599]  ret_from_fork+0x3a/0x50
[  392.066106] Kernel panic - not syncing: hung_task: blocked tasks
[  392.559143] kworker/u4:0(7): getblk(): executed=9 bh_count=0 bh_state=0
[  392.560376] CPU: 0 PID: 1011 Comm: khungtaskd Not tainted 4.20.0-rc1-next-20181109+ #110
[  393.081750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  393.091161] Call Trace:
[  393.093752]  dump_stack+0x244/0x39d
[  393.097380]  ? dump_stack_print_info.cold.1+0x20/0x20
[  393.102627]  panic+0x2ad/0x55c
[  393.105821]  ? add_taint.cold.5+0x16/0x16
[  393.109971]  ? nmi_trigger_cpumask_backtrace+0x1c8/0x22a
[  393.115417]  ? nmi_trigger_cpumask_backtrace+0x1f9/0x22a
[  393.120861]  ? nmi_trigger_cpumask_backtrace+0x1d1/0x22a
[  393.126310]  ? nmi_trigger_cpumask_backtrace+0x1c8/0x22a
[  393.131761]  watchdog+0xb5d/0x1060
[  393.135313]  ? hungtask_pm_notify+0xb0/0xb0
[  393.139637]  ? __kthread_parkme+0xce/0x1a0
[  393.143877]  ? _raw_spin_unlock_irqrestore+0x82/0xd0
[  393.148979]  ? _raw_spin_unlock_irqrestore+0x82/0xd0
[  393.154086]  ? lockdep_hardirqs_on+0x3bb/0x5b0
[  393.158669]  ? trace_hardirqs_on+0xbd/0x310
[  393.162989]  ? kasan_check_read+0x11/0x20
[  393.167139]  ? __kthread_parkme+0xce/0x1a0
[  393.171378]  ? trace_hardirqs_off_caller+0x300/0x300
[  393.176480]  ? __schedule+0x21d0/0x21d0
[  393.180452]  ? lockdep_init_map+0x9/0x10
[  393.184524]  ? _raw_spin_unlock_irqrestore+0x6d/0xd0
[  393.189631]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  393.195166]  ? __kthread_parkme+0xfb/0x1a0
[  393.199404]  ? hungtask_pm_notify+0xb0/0xb0
[  393.203724]  kthread+0x35a/0x440
[  393.207096]  ? kthread_stop+0x8f0/0x8f0
[  393.211074]  ret_from_fork+0x3a/0x50
[  393.216117] Kernel Offset: disabled
[  393.219741] Rebooting in 86400 seconds..