Warning: Permanently added '[localhost]:12611' (ECDSA) to the list of known hosts. 2022/09/15 10:53:38 fuzzer started 2022/09/15 10:53:38 dialing manager at localhost:36559 syzkaller login: [ 43.723585] cgroup: Unknown subsys name 'net' [ 43.827158] cgroup: Unknown subsys name 'rlimit' 2022/09/15 10:53:52 syscalls: 2215 2022/09/15 10:53:52 code coverage: enabled 2022/09/15 10:53:52 comparison tracing: enabled 2022/09/15 10:53:52 extra coverage: enabled 2022/09/15 10:53:52 setuid sandbox: enabled 2022/09/15 10:53:52 namespace sandbox: enabled 2022/09/15 10:53:52 Android sandbox: enabled 2022/09/15 10:53:52 fault injection: enabled 2022/09/15 10:53:52 leak checking: enabled 2022/09/15 10:53:52 net packet injection: enabled 2022/09/15 10:53:52 net device setup: enabled 2022/09/15 10:53:52 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/15 10:53:52 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/15 10:53:52 USB emulation: enabled 2022/09/15 10:53:52 hci packet injection: enabled 2022/09/15 10:53:52 wifi device emulation: failed to parse kernel version (6.0.0-rc5-next-20220915) 2022/09/15 10:53:52 802.15.4 emulation: enabled 2022/09/15 10:53:52 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/15 10:53:52 fetching corpus: 36, signal 32932/33404 (executing program) 2022/09/15 10:53:52 fetching corpus: 36, signal 32932/33656 (executing program) 2022/09/15 10:53:52 fetching corpus: 36, signal 32932/33874 (executing program) 2022/09/15 10:53:52 fetching corpus: 36, signal 32932/34142 (executing program) 2022/09/15 10:53:52 fetching corpus: 36, signal 32932/34381 (executing program) 2022/09/15 10:53:52 fetching corpus: 36, signal 32932/34651 (executing program) 2022/09/15 10:53:52 fetching corpus: 36, signal 32932/34900 (executing program) 2022/09/15 10:53:52 fetching corpus: 36, signal 32932/35144 (executing program) 2022/09/15 10:53:52 fetching corpus: 36, signal 32932/35372 (executing program) 2022/09/15 10:53:52 fetching corpus: 36, signal 32932/35603 (executing program) 2022/09/15 10:53:52 fetching corpus: 36, signal 32932/35836 (executing program) 2022/09/15 10:53:52 fetching corpus: 36, signal 32932/36078 (executing program) 2022/09/15 10:53:52 fetching corpus: 36, signal 32932/36333 (executing program) 2022/09/15 10:53:52 fetching corpus: 36, signal 32932/36590 (executing program) 2022/09/15 10:53:52 fetching corpus: 36, signal 32932/36817 (executing program) 2022/09/15 10:53:52 fetching corpus: 36, signal 32932/37088 (executing program) 2022/09/15 10:53:52 fetching corpus: 36, signal 32932/37324 (executing program) 2022/09/15 10:53:52 fetching corpus: 36, signal 32932/37500 (executing program) 2022/09/15 10:53:52 fetching corpus: 36, signal 32932/37500 (executing program) 2022/09/15 10:53:55 starting 8 fuzzer processes 10:53:55 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$setownex(r0, 0xf, &(0x7f0000000200)={0x0, 0xffffffffffffffff}) 10:53:55 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_buf(r0, 0x1, 0x3b, 0x0, &(0x7f00000000c0)) 10:53:55 executing program 2: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000580)) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCGETA(r0, 0x5607, 0x0) 10:53:55 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x7040, 0x0) [ 60.214180] audit: type=1400 audit(1663239235.445:6): avc: denied { execmem } for pid=283 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 10:53:55 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x109240, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000052000102"], 0x28}}, 0x0) readv(r1, &(0x7f0000002380)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1) fstat(r0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003880)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003800)=[@rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}], 0x50}, 0x0) 10:53:55 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 10:53:55 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000140)) 10:53:55 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000002980), 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000002a00)={0x2, &(0x7f00000029c0)=[{}, {0xff}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a40), 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000005340), 0x401, 0x4000) statx(0xffffffffffffff9c, &(0x7f0000005380)='./file0\x00', 0x2000, 0x0, 0x0) r2 = clone3(&(0x7f0000005b80)={0xc001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000005b40)=[0xffffffffffffffff], 0x1}, 0x58) sendmsg$netlink(r0, &(0x7f0000005d00)={&(0x7f0000000000), 0xc, &(0x7f0000002c40)=[{&(0x7f0000000040)={0x10, 0x0, 0x0, 0x0, 0x0, "", [@generic]}, 0x10}], 0x1, &(0x7f0000005c00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [r1, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0xd8, 0x24004080}, 0x20004000) syz_genetlink_get_family_id$nl80211(&(0x7f0000005d80), 0xffffffffffffffff) [ 61.466222] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 61.468443] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 61.470628] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 61.474154] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 61.476160] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 61.477868] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 61.483389] Bluetooth: hci0: HCI_REQ-0x0c1a [ 61.522710] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 61.528958] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 61.530717] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 61.535867] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 61.537858] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 61.539495] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 61.544413] Bluetooth: hci1: HCI_REQ-0x0c1a [ 61.594190] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 61.596079] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 61.601811] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 61.602886] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 61.604325] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 61.606413] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 61.610912] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 61.612253] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 61.615071] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 61.615428] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 61.617814] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 61.619875] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 61.638898] Bluetooth: hci2: HCI_REQ-0x0c1a [ 61.641079] Bluetooth: hci3: HCI_REQ-0x0c1a [ 61.708623] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 61.713826] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 61.715890] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 61.721815] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 61.723912] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 61.725507] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 61.730737] Bluetooth: hci6: HCI_REQ-0x0c1a [ 61.770489] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 61.784250] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 61.789919] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 61.809830] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 61.815877] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 61.825945] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 61.844617] Bluetooth: hci7: HCI_REQ-0x0c1a [ 63.552290] Bluetooth: hci0: command 0x0409 tx timeout [ 63.615671] Bluetooth: hci1: command 0x0409 tx timeout [ 63.678708] Bluetooth: hci3: command 0x0409 tx timeout [ 63.679610] Bluetooth: hci2: command 0x0409 tx timeout [ 63.680401] Bluetooth: hci5: Opcode 0x c03 failed: -110 [ 63.681938] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 63.742626] Bluetooth: hci6: command 0x0409 tx timeout [ 63.871584] Bluetooth: hci7: command 0x0409 tx timeout [ 65.599628] Bluetooth: hci0: command 0x041b tx timeout [ 65.663616] Bluetooth: hci1: command 0x041b tx timeout [ 65.727659] Bluetooth: hci2: command 0x041b tx timeout [ 65.728113] Bluetooth: hci3: command 0x041b tx timeout [ 65.790627] Bluetooth: hci6: command 0x041b tx timeout [ 65.918634] Bluetooth: hci7: command 0x041b tx timeout [ 66.672970] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 66.678319] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 66.686311] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 66.702692] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 66.707706] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 66.709175] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 66.722611] Bluetooth: hci5: HCI_REQ-0x0c1a [ 67.646717] Bluetooth: hci0: command 0x040f tx timeout [ 67.710583] Bluetooth: hci1: command 0x040f tx timeout [ 67.774603] Bluetooth: hci2: command 0x040f tx timeout [ 67.775636] Bluetooth: hci3: command 0x040f tx timeout [ 67.838646] Bluetooth: hci6: command 0x040f tx timeout [ 67.967598] Bluetooth: hci7: command 0x040f tx timeout [ 68.606688] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 68.734578] Bluetooth: hci5: command 0x0409 tx timeout [ 69.694582] Bluetooth: hci0: command 0x0419 tx timeout [ 69.758666] Bluetooth: hci1: command 0x0419 tx timeout [ 69.822618] Bluetooth: hci3: command 0x0419 tx timeout [ 69.823084] Bluetooth: hci2: command 0x0419 tx timeout [ 69.886608] Bluetooth: hci6: command 0x0419 tx timeout [ 70.014700] Bluetooth: hci7: command 0x0419 tx timeout [ 70.782650] Bluetooth: hci5: command 0x041b tx timeout [ 72.830579] Bluetooth: hci5: command 0x040f tx timeout [ 73.023594] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 74.878589] Bluetooth: hci5: command 0x0419 tx timeout [ 75.696341] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 75.699081] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 75.705019] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 75.707505] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 75.708998] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 75.710562] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 75.713447] Bluetooth: hci4: HCI_REQ-0x0c1a [ 77.759873] Bluetooth: hci4: command 0x0409 tx timeout [ 79.806590] Bluetooth: hci4: command 0x041b tx timeout [ 81.854596] Bluetooth: hci4: command 0x040f tx timeout [ 83.902596] Bluetooth: hci4: command 0x0419 tx timeout 10:54:49 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x109240, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000052000102"], 0x28}}, 0x0) readv(r1, &(0x7f0000002380)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1) fstat(r0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003880)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003800)=[@rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}], 0x50}, 0x0) 10:54:49 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x109240, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000052000102"], 0x28}}, 0x0) readv(r1, &(0x7f0000002380)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1) fstat(r0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003880)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003800)=[@rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}], 0x50}, 0x0) 10:54:49 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x109240, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000052000102"], 0x28}}, 0x0) readv(r1, &(0x7f0000002380)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1) fstat(r0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003880)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003800)=[@rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}], 0x50}, 0x0) 10:54:49 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x109240, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000052000102"], 0x28}}, 0x0) readv(r1, &(0x7f0000002380)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1) fstat(r0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003880)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003800)=[@rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}], 0x50}, 0x0) 10:54:49 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x109240, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000052000102"], 0x28}}, 0x0) readv(r1, &(0x7f0000002380)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1) fstat(r0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003880)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003800)=[@rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}], 0x50}, 0x0) 10:54:49 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x109240, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000052000102"], 0x28}}, 0x0) readv(r1, &(0x7f0000002380)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1) fstat(r0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003880)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003800)=[@rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}], 0x50}, 0x0) 10:54:50 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x109240, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000052000102"], 0x28}}, 0x0) readv(r1, &(0x7f0000002380)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1) fstat(r0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003880)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003800)=[@rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}], 0x50}, 0x0) 10:54:50 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x109240, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000052000102"], 0x28}}, 0x0) readv(r1, &(0x7f0000002380)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1) fstat(r0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003880)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003800)=[@rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}], 0x50}, 0x0) [ 116.685241] audit: type=1400 audit(1663239291.915:7): avc: denied { open } for pid=3735 comm="syz-executor.5" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 116.686727] audit: type=1400 audit(1663239291.916:8): avc: denied { kernel } for pid=3735 comm="syz-executor.5" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 116.695392] ------------[ cut here ]------------ [ 116.695414] [ 116.695416] ====================================================== [ 116.695420] WARNING: possible circular locking dependency detected [ 116.695424] 6.0.0-rc5-next-20220915 #1 Not tainted [ 116.695430] ------------------------------------------------------ [ 116.695434] syz-executor.5/3736 is trying to acquire lock: [ 116.695440] ffffffff853fa878 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 116.695478] [ 116.695478] but task is already holding lock: [ 116.695481] ffff888010059c20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 116.695508] [ 116.695508] which lock already depends on the new lock. [ 116.695508] [ 116.695512] [ 116.695512] the existing dependency chain (in reverse order) is: [ 116.695515] [ 116.695515] -> #3 (&ctx->lock){....}-{2:2}: [ 116.695532] _raw_spin_lock+0x2a/0x40 [ 116.695550] __perf_event_task_sched_out+0x53b/0x18d0 [ 116.695563] __schedule+0xedd/0x2470 [ 116.695573] schedule+0xda/0x1b0 [ 116.695583] exit_to_user_mode_prepare+0x114/0x1a0 [ 116.695604] syscall_exit_to_user_mode+0x19/0x40 [ 116.695623] do_syscall_64+0x48/0x90 [ 116.695637] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 116.695655] [ 116.695655] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 116.695669] _raw_spin_lock_nested+0x30/0x40 [ 116.695684] raw_spin_rq_lock_nested+0x1e/0x30 [ 116.695697] task_fork_fair+0x63/0x4d0 [ 116.695715] sched_cgroup_fork+0x3d0/0x540 [ 116.695729] copy_process+0x4183/0x6e20 [ 116.695739] kernel_clone+0xe7/0x890 [ 116.695749] user_mode_thread+0xad/0xf0 [ 116.695759] rest_init+0x24/0x250 [ 116.695776] arch_call_rest_init+0xf/0x14 [ 116.695788] start_kernel+0x4c1/0x4e6 [ 116.695798] secondary_startup_64_no_verify+0xe0/0xeb [ 116.695813] [ 116.695813] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 116.695826] _raw_spin_lock_irqsave+0x39/0x60 [ 116.695842] try_to_wake_up+0xab/0x1920 [ 116.695855] up+0x75/0xb0 [ 116.695867] __up_console_sem+0x6e/0x80 [ 116.695884] console_unlock+0x46a/0x590 [ 116.695900] do_con_write+0xc05/0x1d50 [ 116.695911] con_write+0x21/0x40 [ 116.695921] n_tty_write+0x4d4/0xfe0 [ 116.695935] file_tty_write.constprop.0+0x49c/0x8f0 [ 116.695947] vfs_write+0x9c3/0xd90 [ 116.695966] ksys_write+0x127/0x250 [ 116.695983] do_syscall_64+0x3b/0x90 [ 116.695997] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 116.696014] [ 116.696014] -> #0 ((console_sem).lock){....}-{2:2}: [ 116.696028] __lock_acquire+0x2a02/0x5e70 [ 116.696045] lock_acquire+0x1a2/0x530 [ 116.696061] _raw_spin_lock_irqsave+0x39/0x60 [ 116.696076] down_trylock+0xe/0x70 [ 116.696089] __down_trylock_console_sem+0x3b/0xd0 [ 116.696105] vprintk_emit+0x16b/0x560 [ 116.696122] vprintk+0x84/0xa0 [ 116.696138] _printk+0xba/0xf1 [ 116.696157] report_bug.cold+0x72/0xab [ 116.696170] handle_bug+0x3c/0x70 [ 116.696183] exc_invalid_op+0x14/0x50 [ 116.696197] asm_exc_invalid_op+0x16/0x20 [ 116.696213] group_sched_out.part.0+0x2c7/0x460 [ 116.696224] ctx_sched_out+0x8f1/0xc10 [ 116.696234] __perf_event_task_sched_out+0x6d0/0x18d0 [ 116.696246] __schedule+0xedd/0x2470 [ 116.696256] schedule+0xda/0x1b0 [ 116.696265] exit_to_user_mode_prepare+0x114/0x1a0 [ 116.696285] syscall_exit_to_user_mode+0x19/0x40 [ 116.696302] do_syscall_64+0x48/0x90 [ 116.696316] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 116.696334] [ 116.696334] other info that might help us debug this: [ 116.696334] [ 116.696336] Chain exists of: [ 116.696336] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 116.696336] [ 116.696351] Possible unsafe locking scenario: [ 116.696351] [ 116.696354] CPU0 CPU1 [ 116.696356] ---- ---- [ 116.696358] lock(&ctx->lock); [ 116.696364] lock(&rq->__lock); [ 116.696371] lock(&ctx->lock); [ 116.696377] lock((console_sem).lock); [ 116.696382] [ 116.696382] *** DEADLOCK *** [ 116.696382] [ 116.696384] 2 locks held by syz-executor.5/3736: [ 116.696391] #0: ffff88806cf37cd8 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 116.696417] #1: ffff888010059c20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 116.696445] [ 116.696445] stack backtrace: [ 116.696447] CPU: 1 PID: 3736 Comm: syz-executor.5 Not tainted 6.0.0-rc5-next-20220915 #1 [ 116.696460] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 116.696468] Call Trace: [ 116.696471] [ 116.696475] dump_stack_lvl+0x8b/0xb3 [ 116.696490] check_noncircular+0x263/0x2e0 [ 116.696507] ? format_decode+0x26c/0xb50 [ 116.696523] ? print_circular_bug+0x450/0x450 [ 116.696540] ? enable_ptr_key_workfn+0x20/0x20 [ 116.696556] ? format_decode+0x26c/0xb50 [ 116.696572] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 116.696590] __lock_acquire+0x2a02/0x5e70 [ 116.696611] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 116.696634] lock_acquire+0x1a2/0x530 [ 116.696651] ? down_trylock+0xe/0x70 [ 116.696666] ? rcu_read_unlock+0x40/0x40 [ 116.696687] ? vprintk+0x84/0xa0 [ 116.696705] _raw_spin_lock_irqsave+0x39/0x60 [ 116.696721] ? down_trylock+0xe/0x70 [ 116.696735] down_trylock+0xe/0x70 [ 116.696748] ? vprintk+0x84/0xa0 [ 116.696766] __down_trylock_console_sem+0x3b/0xd0 [ 116.696783] vprintk_emit+0x16b/0x560 [ 116.696803] vprintk+0x84/0xa0 [ 116.696821] _printk+0xba/0xf1 [ 116.696839] ? record_print_text.cold+0x16/0x16 [ 116.696862] ? report_bug.cold+0x66/0xab [ 116.696877] ? group_sched_out.part.0+0x2c7/0x460 [ 116.696888] report_bug.cold+0x72/0xab [ 116.696903] handle_bug+0x3c/0x70 [ 116.696918] exc_invalid_op+0x14/0x50 [ 116.696933] asm_exc_invalid_op+0x16/0x20 [ 116.696950] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 116.696965] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 116.696976] RSP: 0018:ffff8880301ffc48 EFLAGS: 00010006 [ 116.696985] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 116.696993] RDX: ffff88803bd95040 RSI: ffffffff81566027 RDI: 0000000000000005 [ 116.697001] RBP: ffff88803d1f8000 R08: 0000000000000005 R09: 0000000000000001 [ 116.697008] R10: 0000000000000000 R11: ffffffff865ac05b R12: ffff888010059c00 [ 116.697016] R13: ffff88806cf3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 116.697027] ? group_sched_out.part.0+0x2c7/0x460 [ 116.697040] ? group_sched_out.part.0+0x2c7/0x460 [ 116.697053] ctx_sched_out+0x8f1/0xc10 [ 116.697065] __perf_event_task_sched_out+0x6d0/0x18d0 [ 116.697081] ? lock_is_held_type+0xd7/0x130 [ 116.697100] ? __perf_cgroup_move+0x160/0x160 [ 116.697112] ? set_next_entity+0x304/0x550 [ 116.697130] ? update_curr+0x267/0x740 [ 116.697149] ? lock_is_held_type+0xd7/0x130 [ 116.697168] __schedule+0xedd/0x2470 [ 116.697181] ? io_schedule_timeout+0x150/0x150 [ 116.697194] ? rcu_read_lock_sched_held+0x3e/0x80 [ 116.697215] schedule+0xda/0x1b0 [ 116.697227] exit_to_user_mode_prepare+0x114/0x1a0 [ 116.697248] syscall_exit_to_user_mode+0x19/0x40 [ 116.697267] do_syscall_64+0x48/0x90 [ 116.697281] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 116.697299] RIP: 0033:0x7f56e6ae5b19 [ 116.697308] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 116.697319] RSP: 002b:00007f56e405b218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 116.697330] RAX: 0000000000000001 RBX: 00007f56e6bf8f68 RCX: 00007f56e6ae5b19 [ 116.697337] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f56e6bf8f6c [ 116.697345] RBP: 00007f56e6bf8f60 R08: 000000000000000e R09: 0000000000000000 [ 116.697352] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f56e6bf8f6c [ 116.697360] R13: 00007ffccaad9c0f R14: 00007f56e405b300 R15: 0000000000022000 [ 116.697372] [ 116.754249] WARNING: CPU: 1 PID: 3736 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 116.754939] Modules linked in: [ 116.755180] CPU: 1 PID: 3736 Comm: syz-executor.5 Not tainted 6.0.0-rc5-next-20220915 #1 [ 116.755788] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 116.756613] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 116.757021] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 116.758396] RSP: 0018:ffff8880301ffc48 EFLAGS: 00010006 [ 116.758789] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 116.759316] RDX: ffff88803bd95040 RSI: ffffffff81566027 RDI: 0000000000000005 [ 116.759846] RBP: ffff88803d1f8000 R08: 0000000000000005 R09: 0000000000000001 [ 116.760374] R10: 0000000000000000 R11: ffffffff865ac05b R12: ffff888010059c00 [ 116.761001] R13: ffff88806cf3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 116.761529] FS: 00007f56e405b700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 116.762123] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 116.762570] CR2: 00007ff804fc26f4 CR3: 0000000017d0c000 CR4: 0000000000350ee0 [ 116.763103] Call Trace: [ 116.763297] [ 116.763469] ctx_sched_out+0x8f1/0xc10 [ 116.763765] __perf_event_task_sched_out+0x6d0/0x18d0 [ 116.764156] ? lock_is_held_type+0xd7/0x130 [ 116.764489] ? __perf_cgroup_move+0x160/0x160 [ 116.764833] ? set_next_entity+0x304/0x550 [ 116.765158] ? update_curr+0x267/0x740 [ 116.765463] ? lock_is_held_type+0xd7/0x130 [ 116.765799] __schedule+0xedd/0x2470 [ 116.766088] ? io_schedule_timeout+0x150/0x150 [ 116.766473] ? rcu_read_lock_sched_held+0x3e/0x80 [ 116.766846] schedule+0xda/0x1b0 [ 116.767103] exit_to_user_mode_prepare+0x114/0x1a0 [ 116.767478] syscall_exit_to_user_mode+0x19/0x40 [ 116.767845] do_syscall_64+0x48/0x90 [ 116.768129] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 116.768530] RIP: 0033:0x7f56e6ae5b19 [ 116.768807] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 116.770149] RSP: 002b:00007f56e405b218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 116.770727] RAX: 0000000000000001 RBX: 00007f56e6bf8f68 RCX: 00007f56e6ae5b19 [ 116.771257] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f56e6bf8f6c [ 116.771790] RBP: 00007f56e6bf8f60 R08: 000000000000000e R09: 0000000000000000 [ 116.772320] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f56e6bf8f6c [ 116.772847] R13: 00007ffccaad9c0f R14: 00007f56e405b300 R15: 0000000000022000 [ 116.773382] [ 116.773565] irq event stamp: 644 [ 116.773819] hardirqs last enabled at (643): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 116.774535] hardirqs last disabled at (644): [] __schedule+0x1225/0x2470 [ 116.775144] softirqs last enabled at (334): [] __irq_exit_rcu+0x11b/0x180 [ 116.775787] softirqs last disabled at (301): [] __irq_exit_rcu+0x11b/0x180 [ 116.776420] ---[ end trace 0000000000000000 ]--- [ 116.930490] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 116.971288] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 116.997943] syz-executor.5 (3736) used greatest stack depth: 23704 bytes left 10:54:58 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$setownex(r0, 0xf, &(0x7f0000000200)={0x0, 0xffffffffffffffff}) 10:54:58 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x109240, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000052000102"], 0x28}}, 0x0) readv(r1, &(0x7f0000002380)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1) fstat(r0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003880)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003800)=[@rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}], 0x50}, 0x0) 10:54:58 executing program 2: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000580)) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCGETA(r0, 0x5607, 0x0) 10:54:58 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000140)) 10:54:58 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_buf(r0, 0x1, 0x3b, 0x0, &(0x7f00000000c0)) 10:54:58 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x7040, 0x0) 10:54:58 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000002980), 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000002a00)={0x2, &(0x7f00000029c0)=[{}, {0xff}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a40), 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000005340), 0x401, 0x4000) statx(0xffffffffffffff9c, &(0x7f0000005380)='./file0\x00', 0x2000, 0x0, 0x0) r2 = clone3(&(0x7f0000005b80)={0xc001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000005b40)=[0xffffffffffffffff], 0x1}, 0x58) sendmsg$netlink(r0, &(0x7f0000005d00)={&(0x7f0000000000), 0xc, &(0x7f0000002c40)=[{&(0x7f0000000040)={0x10, 0x0, 0x0, 0x0, 0x0, "", [@generic]}, 0x10}], 0x1, &(0x7f0000005c00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [r1, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0xd8, 0x24004080}, 0x20004000) syz_genetlink_get_family_id$nl80211(&(0x7f0000005d80), 0xffffffffffffffff) 10:54:58 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) [ 123.028549] hrtimer: interrupt took 18023 ns 10:54:58 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_buf(r0, 0x1, 0x3b, 0x0, &(0x7f00000000c0)) [ 123.154189] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 10:54:58 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$setownex(r0, 0xf, &(0x7f0000000200)={0x0, 0xffffffffffffffff}) 10:54:58 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x7040, 0x0) 10:54:58 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000140)) 10:54:58 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000002980), 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000002a00)={0x2, &(0x7f00000029c0)=[{}, {0xff}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a40), 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000005340), 0x401, 0x4000) statx(0xffffffffffffff9c, &(0x7f0000005380)='./file0\x00', 0x2000, 0x0, 0x0) r2 = clone3(&(0x7f0000005b80)={0xc001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000005b40)=[0xffffffffffffffff], 0x1}, 0x58) sendmsg$netlink(r0, &(0x7f0000005d00)={&(0x7f0000000000), 0xc, &(0x7f0000002c40)=[{&(0x7f0000000040)={0x10, 0x0, 0x0, 0x0, 0x0, "", [@generic]}, 0x10}], 0x1, &(0x7f0000005c00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [r1, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0xd8, 0x24004080}, 0x20004000) syz_genetlink_get_family_id$nl80211(&(0x7f0000005d80), 0xffffffffffffffff) 10:54:58 executing program 2: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000580)) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCGETA(r0, 0x5607, 0x0) 10:54:58 executing program 4: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000580)) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCGETA(r0, 0x5607, 0x0) 10:54:58 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_buf(r0, 0x1, 0x3b, 0x0, &(0x7f00000000c0)) 10:54:58 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 10:54:58 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$setownex(r0, 0xf, &(0x7f0000000200)={0x0, 0xffffffffffffffff}) 10:54:58 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000140)) 10:54:58 executing program 4: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000580)) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCGETA(r0, 0x5607, 0x0) 10:54:58 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000002980), 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000002a00)={0x2, &(0x7f00000029c0)=[{}, {0xff}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a40), 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000005340), 0x401, 0x4000) statx(0xffffffffffffff9c, &(0x7f0000005380)='./file0\x00', 0x2000, 0x0, 0x0) r2 = clone3(&(0x7f0000005b80)={0xc001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000005b40)=[0xffffffffffffffff], 0x1}, 0x58) sendmsg$netlink(r0, &(0x7f0000005d00)={&(0x7f0000000000), 0xc, &(0x7f0000002c40)=[{&(0x7f0000000040)={0x10, 0x0, 0x0, 0x0, 0x0, "", [@generic]}, 0x10}], 0x1, &(0x7f0000005c00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [r1, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0xd8, 0x24004080}, 0x20004000) syz_genetlink_get_family_id$nl80211(&(0x7f0000005d80), 0xffffffffffffffff) 10:54:58 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x7040, 0x0) [ 123.552045] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 10:54:58 executing program 4: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000580)) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCGETA(r0, 0x5607, 0x0) 10:54:58 executing program 2: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000580)) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCGETA(r0, 0x5607, 0x0) 10:54:58 executing program 0: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000580)) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCGETA(r0, 0x5607, 0x0) 10:54:58 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 10:54:58 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000140)) 10:54:58 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 10:54:58 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 10:54:58 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 10:54:59 executing program 0: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000580)) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCGETA(r0, 0x5607, 0x0) 10:54:59 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) [ 123.894157] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 10:54:59 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000140)) 10:54:59 executing program 0: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000580)) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCGETA(r0, 0x5607, 0x0) [ 124.216607] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 124.233946] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 124.512632] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 124.610933] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 10:55:00 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000140)) 10:55:00 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 10:55:00 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 10:55:00 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 10:55:00 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 10:55:00 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 10:55:00 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 10:55:00 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) [ 125.161863] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 10:55:00 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) [ 125.197897] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 125.214878] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 125.560029] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 125.603125] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 125.721574] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 10:55:00 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) [ 125.754553] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 10:55:01 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) [ 125.789901] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 10:55:01 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 10:55:01 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 10:55:01 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 10:55:01 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 10:55:01 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 10:55:01 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) [ 126.131937] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 126.159277] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 126.181484] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 126.251022] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 126.287353] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 126.402157] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 10:55:01 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) [ 126.523413] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 126.585425] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 VM DIAGNOSIS: 10:54:52 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=0000000000000001 RCX=0000000000000001 RDX=ffff888017e2ff01 RSI=ffff888017e2ff48 RDI=ffff888017e2ff48 RBP=ffff888017e2ff48 RSP=ffff888017e2f5b8 R8 =ffffffff8623cb0a R9 =ffffffff8623cb0e R10=ffffed1002fc5ed4 R11=ffff888017e2f678 R12=ffff888017e2f679 R13=ffff888017e2f698 R14=ffff888017e2f638 R15=0000000000000007 RIP=ffffffff8111c80a RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fa8e3faf1f0 CR3=0000000039610000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 756e696c2d34365f 3638782f62696c2f YMM01=0000000000000000 0000000000000000 6461657268747062 696c2f756e672d78 YMM02=0000000000000000 0000000000000000 00302e6f732e6461 657268747062696c YMM03=0000000000000000 0000000000000000 2f756e672d78756e 696c2d34365f3638 YMM04=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000030 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b29f1 RDI=ffffffff87641ba0 RBP=ffffffff87641b60 RSP=ffff8880301ff698 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000030 R11=0000000000000001 R12=0000000000000030 R13=ffffffff87641b60 R14=0000000000000010 R15=ffffffff822b29e0 RIP=ffffffff822b2a49 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f56e405b700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ff804fc26f4 CR3=0000000017d0c000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f56e6bcc7c0 00007f56e6bcc7c8 YMM02=0000000000000000 0000000000000000 00007f56e6bcc7e0 00007f56e6bcc7c0 YMM03=0000000000000000 0000000000000000 00007f56e6bcc7c8 00007f56e6bcc7c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000