Warning: Permanently added '[localhost]:64324' (ECDSA) to the list of known hosts. 2022/10/04 14:38:18 fuzzer started 2022/10/04 14:38:19 dialing manager at localhost:46847 syzkaller login: [ 46.248541] cgroup: Unknown subsys name 'net' [ 46.363111] cgroup: Unknown subsys name 'rlimit' 2022/10/04 14:38:31 syscalls: 2215 2022/10/04 14:38:31 code coverage: enabled 2022/10/04 14:38:31 comparison tracing: enabled 2022/10/04 14:38:31 extra coverage: enabled 2022/10/04 14:38:31 setuid sandbox: enabled 2022/10/04 14:38:31 namespace sandbox: enabled 2022/10/04 14:38:31 Android sandbox: enabled 2022/10/04 14:38:31 fault injection: enabled 2022/10/04 14:38:31 leak checking: enabled 2022/10/04 14:38:31 net packet injection: enabled 2022/10/04 14:38:31 net device setup: enabled 2022/10/04 14:38:31 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/10/04 14:38:31 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/10/04 14:38:31 USB emulation: enabled 2022/10/04 14:38:31 hci packet injection: enabled 2022/10/04 14:38:31 wifi device emulation: failed to parse kernel version (6.0.0-next-20221004) 2022/10/04 14:38:31 802.15.4 emulation: enabled 2022/10/04 14:38:31 fetching corpus: 0, signal 0/2000 (executing program) 2022/10/04 14:38:32 fetching corpus: 50, signal 21506/24905 (executing program) 2022/10/04 14:38:32 fetching corpus: 100, signal 31418/36105 (executing program) 2022/10/04 14:38:32 fetching corpus: 150, signal 47301/52711 (executing program) 2022/10/04 14:38:32 fetching corpus: 200, signal 53794/60157 (executing program) 2022/10/04 14:38:32 fetching corpus: 250, signal 58481/65787 (executing program) 2022/10/04 14:38:32 fetching corpus: 300, signal 64608/72551 (executing program) 2022/10/04 14:38:32 fetching corpus: 350, signal 66750/75603 (executing program) 2022/10/04 14:38:32 fetching corpus: 400, signal 71339/80770 (executing program) 2022/10/04 14:38:33 fetching corpus: 450, signal 74779/84808 (executing program) 2022/10/04 14:38:33 fetching corpus: 500, signal 78090/88641 (executing program) 2022/10/04 14:38:33 fetching corpus: 550, signal 79907/91166 (executing program) 2022/10/04 14:38:33 fetching corpus: 600, signal 84690/96055 (executing program) 2022/10/04 14:38:33 fetching corpus: 650, signal 85959/97964 (executing program) 2022/10/04 14:38:33 fetching corpus: 700, signal 88580/100896 (executing program) 2022/10/04 14:38:33 fetching corpus: 750, signal 90555/103261 (executing program) 2022/10/04 14:38:33 fetching corpus: 800, signal 92241/105392 (executing program) 2022/10/04 14:38:34 fetching corpus: 850, signal 96025/109102 (executing program) 2022/10/04 14:38:34 fetching corpus: 900, signal 99003/112042 (executing program) 2022/10/04 14:38:34 fetching corpus: 950, signal 100820/114072 (executing program) 2022/10/04 14:38:34 fetching corpus: 1000, signal 101805/115435 (executing program) 2022/10/04 14:38:34 fetching corpus: 1050, signal 102625/116672 (executing program) 2022/10/04 14:38:34 fetching corpus: 1100, signal 104085/118314 (executing program) 2022/10/04 14:38:34 fetching corpus: 1150, signal 106510/120555 (executing program) 2022/10/04 14:38:34 fetching corpus: 1200, signal 108224/122257 (executing program) 2022/10/04 14:38:35 fetching corpus: 1250, signal 110854/124550 (executing program) 2022/10/04 14:38:35 fetching corpus: 1300, signal 112017/125834 (executing program) 2022/10/04 14:38:35 fetching corpus: 1350, signal 113301/127200 (executing program) 2022/10/04 14:38:35 fetching corpus: 1400, signal 115709/129236 (executing program) 2022/10/04 14:38:35 fetching corpus: 1450, signal 116905/130448 (executing program) 2022/10/04 14:38:35 fetching corpus: 1500, signal 118947/132068 (executing program) 2022/10/04 14:38:35 fetching corpus: 1550, signal 119844/133032 (executing program) 2022/10/04 14:38:35 fetching corpus: 1600, signal 121895/134601 (executing program) 2022/10/04 14:38:36 fetching corpus: 1650, signal 122871/135571 (executing program) 2022/10/04 14:38:36 fetching corpus: 1700, signal 124705/137037 (executing program) 2022/10/04 14:38:36 fetching corpus: 1750, signal 126061/138033 (executing program) 2022/10/04 14:38:36 fetching corpus: 1800, signal 127047/138877 (executing program) 2022/10/04 14:38:36 fetching corpus: 1850, signal 128317/139853 (executing program) 2022/10/04 14:38:36 fetching corpus: 1900, signal 129806/141152 (executing program) 2022/10/04 14:38:36 fetching corpus: 1950, signal 131022/142010 (executing program) 2022/10/04 14:38:37 fetching corpus: 2000, signal 132202/142819 (executing program) 2022/10/04 14:38:37 fetching corpus: 2050, signal 133403/143583 (executing program) 2022/10/04 14:38:37 fetching corpus: 2100, signal 134514/144276 (executing program) 2022/10/04 14:38:37 fetching corpus: 2150, signal 135892/145079 (executing program) 2022/10/04 14:38:37 fetching corpus: 2200, signal 137540/145933 (executing program) 2022/10/04 14:38:37 fetching corpus: 2250, signal 138452/146454 (executing program) 2022/10/04 14:38:37 fetching corpus: 2300, signal 139517/147167 (executing program) 2022/10/04 14:38:37 fetching corpus: 2350, signal 140260/147635 (executing program) 2022/10/04 14:38:37 fetching corpus: 2400, signal 141430/148186 (executing program) 2022/10/04 14:38:38 fetching corpus: 2450, signal 142320/148600 (executing program) 2022/10/04 14:38:38 fetching corpus: 2500, signal 143148/148998 (executing program) 2022/10/04 14:38:38 fetching corpus: 2550, signal 143875/149321 (executing program) 2022/10/04 14:38:38 fetching corpus: 2600, signal 144376/149553 (executing program) 2022/10/04 14:38:38 fetching corpus: 2650, signal 145016/149848 (executing program) 2022/10/04 14:38:38 fetching corpus: 2700, signal 146575/150354 (executing program) 2022/10/04 14:38:38 fetching corpus: 2716, signal 146730/150462 (executing program) 2022/10/04 14:38:38 fetching corpus: 2716, signal 146730/150530 (executing program) 2022/10/04 14:38:38 fetching corpus: 2716, signal 146730/150609 (executing program) 2022/10/04 14:38:38 fetching corpus: 2716, signal 146730/150676 (executing program) 2022/10/04 14:38:38 fetching corpus: 2716, signal 146730/150744 (executing program) 2022/10/04 14:38:38 fetching corpus: 2716, signal 146730/150811 (executing program) 2022/10/04 14:38:38 fetching corpus: 2716, signal 146730/150862 (executing program) 2022/10/04 14:38:38 fetching corpus: 2716, signal 146730/150912 (executing program) 2022/10/04 14:38:38 fetching corpus: 2716, signal 146730/150970 (executing program) 2022/10/04 14:38:38 fetching corpus: 2716, signal 146730/151027 (executing program) 2022/10/04 14:38:38 fetching corpus: 2716, signal 146730/151109 (executing program) 2022/10/04 14:38:38 fetching corpus: 2716, signal 146730/151191 (executing program) 2022/10/04 14:38:38 fetching corpus: 2716, signal 146730/151263 (executing program) 2022/10/04 14:38:38 fetching corpus: 2716, signal 146730/151334 (executing program) 2022/10/04 14:38:38 fetching corpus: 2716, signal 146730/151403 (executing program) 2022/10/04 14:38:38 fetching corpus: 2716, signal 146730/151462 (executing program) 2022/10/04 14:38:38 fetching corpus: 2716, signal 146730/151530 (executing program) 2022/10/04 14:38:38 fetching corpus: 2716, signal 146730/151594 (executing program) 2022/10/04 14:38:38 fetching corpus: 2716, signal 146730/151667 (executing program) 2022/10/04 14:38:38 fetching corpus: 2716, signal 146730/151680 (executing program) 2022/10/04 14:38:38 fetching corpus: 2716, signal 146730/151680 (executing program) 2022/10/04 14:38:41 starting 8 fuzzer processes 14:38:41 executing program 0: mlockall(0x2) 14:38:41 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devpts\x00', 0x0, 0x0) r0 = inotify_init() r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x500000a) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x500) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:38:41 executing program 3: r0 = eventfd(0x0) write$eventfd(r0, 0x0, 0x0) [ 68.814136] audit: type=1400 audit(1664894321.838:6): avc: denied { execmem } for pid=285 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 14:38:41 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, &(0x7f0000000240)) 14:38:41 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file1\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000580)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize}]}}) 14:38:41 executing program 5: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x4000) shmat(r0, &(0x7f0000ffd000/0x1000)=nil, 0x5000) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) 14:38:41 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc0189436, &(0x7f0000000000)) 14:38:41 executing program 6: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000300)=[{&(0x7f0000000240)="bb", 0x1}], 0x1) vmsplice(r0, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) [ 70.141769] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 70.145270] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 70.148329] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 70.152676] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 70.154567] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 70.166932] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 70.173102] Bluetooth: hci0: HCI_REQ-0x0c1a [ 70.202106] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 70.204062] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 70.205925] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 70.208853] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 70.210806] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 70.212211] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 70.216170] Bluetooth: hci2: HCI_REQ-0x0c1a [ 70.237808] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 70.240201] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 70.243090] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 70.271008] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 70.273044] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 70.275636] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 70.276759] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 70.278809] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 70.280981] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 70.284296] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 70.285532] Bluetooth: hci1: HCI_REQ-0x0c1a [ 70.297208] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 70.299351] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 70.308535] Bluetooth: hci3: HCI_REQ-0x0c1a [ 70.310203] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 70.369370] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 70.374358] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 70.376560] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 70.378986] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 70.380611] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 70.382365] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 70.384791] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 70.385987] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 70.387553] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 70.388890] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 70.391239] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 70.392352] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 70.394920] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 70.401286] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 70.403421] Bluetooth: hci5: HCI_REQ-0x0c1a [ 70.404377] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 70.406299] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 70.423121] Bluetooth: hci6: HCI_REQ-0x0c1a [ 70.454733] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 70.468954] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 70.470486] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 70.472285] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 70.477097] Bluetooth: hci7: HCI_REQ-0x0c1a [ 70.494328] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 70.527777] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 70.535277] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 70.540054] Bluetooth: hci4: HCI_REQ-0x0c1a [ 72.227981] Bluetooth: hci2: command 0x0409 tx timeout [ 72.227991] Bluetooth: hci0: command 0x0409 tx timeout [ 72.292532] Bluetooth: hci1: command 0x0409 tx timeout [ 72.355621] Bluetooth: hci3: command 0x0409 tx timeout [ 72.484068] Bluetooth: hci6: command 0x0409 tx timeout [ 72.484095] Bluetooth: hci5: command 0x0409 tx timeout [ 72.547529] Bluetooth: hci4: command 0x0409 tx timeout [ 72.548616] Bluetooth: hci7: command 0x0409 tx timeout [ 74.275550] Bluetooth: hci0: command 0x041b tx timeout [ 74.276083] Bluetooth: hci2: command 0x041b tx timeout [ 74.339542] Bluetooth: hci1: command 0x041b tx timeout [ 74.403515] Bluetooth: hci3: command 0x041b tx timeout [ 74.531493] Bluetooth: hci5: command 0x041b tx timeout [ 74.531947] Bluetooth: hci6: command 0x041b tx timeout [ 74.596965] Bluetooth: hci7: command 0x041b tx timeout [ 74.597398] Bluetooth: hci4: command 0x041b tx timeout [ 76.323496] Bluetooth: hci2: command 0x040f tx timeout [ 76.323957] Bluetooth: hci0: command 0x040f tx timeout [ 76.388545] Bluetooth: hci1: command 0x040f tx timeout [ 76.452613] Bluetooth: hci3: command 0x040f tx timeout [ 76.580548] Bluetooth: hci6: command 0x040f tx timeout [ 76.580993] Bluetooth: hci5: command 0x040f tx timeout [ 76.643526] Bluetooth: hci4: command 0x040f tx timeout [ 76.643992] Bluetooth: hci7: command 0x040f tx timeout [ 78.372585] Bluetooth: hci0: command 0x0419 tx timeout [ 78.373044] Bluetooth: hci2: command 0x0419 tx timeout [ 78.435524] Bluetooth: hci1: command 0x0419 tx timeout [ 78.499490] Bluetooth: hci3: command 0x0419 tx timeout [ 78.628547] Bluetooth: hci5: command 0x0419 tx timeout [ 78.628992] Bluetooth: hci6: command 0x0419 tx timeout [ 78.691994] Bluetooth: hci7: command 0x0419 tx timeout [ 78.692603] Bluetooth: hci4: command 0x0419 tx timeout 14:39:35 executing program 3: r0 = eventfd(0x0) write$eventfd(r0, 0x0, 0x0) 14:39:35 executing program 3: r0 = eventfd(0x0) write$eventfd(r0, 0x0, 0x0) 14:39:35 executing program 3: r0 = eventfd(0x0) write$eventfd(r0, 0x0, 0x0) 14:39:35 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x127e) 14:39:35 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x127e) 14:39:36 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x127e) 14:39:36 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x127e) 14:39:36 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[], 0x820) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0xfb, 0x16, 0x4, 0x7, "2a35603e7b266c3ac08bc86d576ecd03", "04"}, 0x16, 0x1) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r4, r3, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x4, 0x80, 0x0, 0x8, 0x5, 0x40, 0x0, 0x2000000000000, 0xa0600, 0x9, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000140), 0x4}, 0x10246, 0xe4, 0x7, 0x0, 0x7, 0xffff, 0x1, 0x0, 0x9, 0x0, 0x169}, r3, 0x3, 0xffffffffffffffff, 0xf) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000000)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) signalfd4(r5, &(0x7f0000000040)={[0x101]}, 0x8, 0x40000) ioctl$EXT4_IOC_CHECKPOINT(r4, 0x4004662b, &(0x7f0000000340)) [ 123.422586] audit: type=1400 audit(1664894376.447:7): avc: denied { open } for pid=3804 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 123.424158] audit: type=1400 audit(1664894376.448:8): avc: denied { kernel } for pid=3804 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 123.440564] ------------[ cut here ]------------ [ 123.440587] [ 123.440591] ====================================================== [ 123.440594] WARNING: possible circular locking dependency detected [ 123.440598] 6.0.0-next-20221004 #1 Not tainted [ 123.440604] ------------------------------------------------------ [ 123.440607] syz-executor.3/3807 is trying to acquire lock: [ 123.440613] ffffffff853faaf8 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 123.440654] [ 123.440654] but task is already holding lock: [ 123.440657] ffff8880084d9420 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 123.440685] [ 123.440685] which lock already depends on the new lock. [ 123.440685] [ 123.440688] [ 123.440688] the existing dependency chain (in reverse order) is: [ 123.440691] [ 123.440691] -> #3 (&ctx->lock){....}-{2:2}: [ 123.440705] _raw_spin_lock+0x2a/0x40 [ 123.440716] __perf_event_task_sched_out+0x53b/0x18d0 [ 123.440727] __schedule+0xedd/0x2470 [ 123.440741] schedule+0xda/0x1b0 [ 123.440755] futex_wait_queue+0xf5/0x1e0 [ 123.440767] futex_wait+0x28e/0x690 [ 123.440777] do_futex+0x2ff/0x380 [ 123.440787] __x64_sys_futex+0x1c6/0x4d0 [ 123.440797] do_syscall_64+0x3b/0x90 [ 123.440814] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 123.440827] [ 123.440827] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 123.440841] _raw_spin_lock_nested+0x30/0x40 [ 123.440852] raw_spin_rq_lock_nested+0x1e/0x30 [ 123.440864] task_fork_fair+0x63/0x4d0 [ 123.440880] sched_cgroup_fork+0x3d0/0x540 [ 123.440894] copy_process+0x4183/0x6e20 [ 123.440905] kernel_clone+0xe7/0x890 [ 123.440914] user_mode_thread+0xad/0xf0 [ 123.440924] rest_init+0x24/0x250 [ 123.440936] arch_call_rest_init+0xf/0x14 [ 123.440955] start_kernel+0x4c6/0x4eb [ 123.440971] secondary_startup_64_no_verify+0xe0/0xeb [ 123.440985] [ 123.440985] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 123.440998] _raw_spin_lock_irqsave+0x39/0x60 [ 123.441009] try_to_wake_up+0xab/0x1930 [ 123.441022] up+0x75/0xb0 [ 123.441036] __up_console_sem+0x6e/0x80 [ 123.441052] console_unlock+0x46a/0x590 [ 123.441068] do_con_write+0xc05/0x1d50 [ 123.441078] con_write+0x21/0x40 [ 123.441088] n_tty_write+0x4d4/0xfe0 [ 123.441100] file_tty_write.constprop.0+0x455/0x8a0 [ 123.441111] vfs_write+0x9c3/0xd90 [ 123.441127] ksys_write+0x127/0x250 [ 123.441142] do_syscall_64+0x3b/0x90 [ 123.441159] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 123.441172] [ 123.441172] -> #0 ((console_sem).lock){....}-{2:2}: [ 123.441186] __lock_acquire+0x2a02/0x5e70 [ 123.441202] lock_acquire+0x1a2/0x530 [ 123.441218] _raw_spin_lock_irqsave+0x39/0x60 [ 123.441229] down_trylock+0xe/0x70 [ 123.441244] __down_trylock_console_sem+0x3b/0xd0 [ 123.441260] vprintk_emit+0x16b/0x560 [ 123.441276] vprintk+0x84/0xa0 [ 123.441291] _printk+0xba/0xf1 [ 123.441303] report_bug.cold+0x72/0xab [ 123.441319] handle_bug+0x3c/0x70 [ 123.441328] exc_invalid_op+0x14/0x50 [ 123.441337] asm_exc_invalid_op+0x16/0x20 [ 123.441350] group_sched_out.part.0+0x2c7/0x460 [ 123.441367] ctx_sched_out+0x8f1/0xc10 [ 123.441383] __perf_event_task_sched_out+0x6d0/0x18d0 [ 123.441394] __schedule+0xedd/0x2470 [ 123.441408] schedule+0xda/0x1b0 [ 123.441422] futex_wait_queue+0xf5/0x1e0 [ 123.441432] futex_wait+0x28e/0x690 [ 123.441442] do_futex+0x2ff/0x380 [ 123.441452] __x64_sys_futex+0x1c6/0x4d0 [ 123.441462] do_syscall_64+0x3b/0x90 [ 123.441479] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 123.441492] [ 123.441492] other info that might help us debug this: [ 123.441492] [ 123.441494] Chain exists of: [ 123.441494] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 123.441494] [ 123.441508] Possible unsafe locking scenario: [ 123.441508] [ 123.441510] CPU0 CPU1 [ 123.441513] ---- ---- [ 123.441515] lock(&ctx->lock); [ 123.441520] lock(&rq->__lock); [ 123.441526] lock(&ctx->lock); [ 123.441532] lock((console_sem).lock); [ 123.441538] [ 123.441538] *** DEADLOCK *** [ 123.441538] [ 123.441539] 2 locks held by syz-executor.3/3807: [ 123.441546] #0: ffff88806ce37e98 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 123.441576] #1: ffff8880084d9420 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 123.441602] [ 123.441602] stack backtrace: [ 123.441604] CPU: 0 PID: 3807 Comm: syz-executor.3 Not tainted 6.0.0-next-20221004 #1 [ 123.441617] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 123.441625] Call Trace: [ 123.441628] [ 123.441633] dump_stack_lvl+0x8b/0xb3 [ 123.441651] check_noncircular+0x263/0x2e0 [ 123.441668] ? format_decode+0x26c/0xb50 [ 123.441684] ? print_circular_bug+0x450/0x450 [ 123.441701] ? simple_strtoul+0x30/0x30 [ 123.441717] ? lock_chain_count+0x20/0x20 [ 123.441733] ? format_decode+0x26c/0xb50 [ 123.441751] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 123.441768] __lock_acquire+0x2a02/0x5e70 [ 123.441790] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 123.441812] lock_acquire+0x1a2/0x530 [ 123.441828] ? down_trylock+0xe/0x70 [ 123.441846] ? lock_release+0x750/0x750 [ 123.441866] ? vprintk+0x84/0xa0 [ 123.441884] _raw_spin_lock_irqsave+0x39/0x60 [ 123.441895] ? down_trylock+0xe/0x70 [ 123.441912] down_trylock+0xe/0x70 [ 123.441928] ? vprintk+0x84/0xa0 [ 123.441945] __down_trylock_console_sem+0x3b/0xd0 [ 123.441962] vprintk_emit+0x16b/0x560 [ 123.441981] vprintk+0x84/0xa0 [ 123.441998] _printk+0xba/0xf1 [ 123.442010] ? record_print_text.cold+0x16/0x16 [ 123.442026] ? report_bug.cold+0x66/0xab [ 123.442044] ? group_sched_out.part.0+0x2c7/0x460 [ 123.442062] report_bug.cold+0x72/0xab [ 123.442081] handle_bug+0x3c/0x70 [ 123.442091] exc_invalid_op+0x14/0x50 [ 123.442102] asm_exc_invalid_op+0x16/0x20 [ 123.442115] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 123.442135] Code: 5e 41 5f e9 8b ae ef ff e8 86 ae ef ff 65 8b 1d 2b 08 ac 7e 31 ff 89 de e8 26 ab ef ff 85 db 0f 84 8a 00 00 00 e8 69 ae ef ff <0f> 0b e9 a5 fe ff ff e8 5d ae ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 123.442146] RSP: 0018:ffff88803ff2f8f8 EFLAGS: 00010006 [ 123.442155] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 123.442163] RDX: ffff88803e8f0000 RSI: ffffffff81566da7 RDI: 0000000000000005 [ 123.442171] RBP: ffff8880086605c8 R08: 0000000000000005 R09: 0000000000000001 [ 123.442178] R10: 0000000000000000 R11: ffffffff865b601b R12: ffff8880084d9400 [ 123.442186] R13: ffff88806ce3d2c0 R14: ffffffff8547d040 R15: 0000000000000002 [ 123.442196] ? group_sched_out.part.0+0x2c7/0x460 [ 123.442216] ? group_sched_out.part.0+0x2c7/0x460 [ 123.442236] ctx_sched_out+0x8f1/0xc10 [ 123.442255] __perf_event_task_sched_out+0x6d0/0x18d0 [ 123.442269] ? lock_is_held_type+0xd7/0x130 [ 123.442283] ? __perf_cgroup_move+0x160/0x160 [ 123.442294] ? set_next_entity+0x304/0x550 [ 123.442314] ? lock_is_held_type+0xd7/0x130 [ 123.442328] __schedule+0xedd/0x2470 [ 123.442345] ? io_schedule_timeout+0x150/0x150 [ 123.442361] ? futex_wait_setup+0x166/0x230 [ 123.442376] schedule+0xda/0x1b0 [ 123.442391] futex_wait_queue+0xf5/0x1e0 [ 123.442403] futex_wait+0x28e/0x690 [ 123.442416] ? futex_wait_setup+0x230/0x230 [ 123.442429] ? wake_up_q+0x8b/0xf0 [ 123.442442] ? do_raw_spin_unlock+0x4f/0x220 [ 123.442461] ? futex_wake+0x158/0x490 [ 123.442477] ? fd_install+0x1f9/0x640 [ 123.442492] do_futex+0x2ff/0x380 [ 123.442503] ? __ia32_compat_sys_get_robust_list+0x3b0/0x3b0 [ 123.442519] __x64_sys_futex+0x1c6/0x4d0 [ 123.442532] ? __x64_sys_futex_time32+0x480/0x480 [ 123.442545] ? syscall_enter_from_user_mode+0x1d/0x50 [ 123.442559] ? syscall_enter_from_user_mode+0x1d/0x50 [ 123.442575] do_syscall_64+0x3b/0x90 [ 123.442593] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 123.442607] RIP: 0033:0x7fc34ffd5b19 [ 123.442616] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 123.442626] RSP: 002b:00007fc34d54b218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 123.442637] RAX: ffffffffffffffda RBX: 00007fc3500e8f68 RCX: 00007fc34ffd5b19 [ 123.442645] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fc3500e8f68 [ 123.442652] RBP: 00007fc3500e8f60 R08: 0000000000000000 R09: 0000000000000000 [ 123.442659] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc3500e8f6c [ 123.442666] R13: 00007fff03406e9f R14: 00007fc34d54b300 R15: 0000000000022000 [ 123.442679] [ 123.506428] WARNING: CPU: 0 PID: 3807 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 123.507355] Modules linked in: [ 123.507680] CPU: 0 PID: 3807 Comm: syz-executor.3 Not tainted 6.0.0-next-20221004 #1 [ 123.508434] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 123.509541] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 123.510098] Code: 5e 41 5f e9 8b ae ef ff e8 86 ae ef ff 65 8b 1d 2b 08 ac 7e 31 ff 89 de e8 26 ab ef ff 85 db 0f 84 8a 00 00 00 e8 69 ae ef ff <0f> 0b e9 a5 fe ff ff e8 5d ae ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 123.511896] RSP: 0018:ffff88803ff2f8f8 EFLAGS: 00010006 [ 123.512426] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 123.513126] RDX: ffff88803e8f0000 RSI: ffffffff81566da7 RDI: 0000000000000005 [ 123.513826] RBP: ffff8880086605c8 R08: 0000000000000005 R09: 0000000000000001 [ 123.514483] R10: 0000000000000000 R11: ffffffff865b601b R12: ffff8880084d9400 [ 123.515205] R13: ffff88806ce3d2c0 R14: ffffffff8547d040 R15: 0000000000000002 [ 123.515913] FS: 00007fc34d54b700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 123.516706] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 123.517273] CR2: 00007fc0d6150000 CR3: 000000001b5fe000 CR4: 0000000000350ef0 [ 123.517962] Call Trace: [ 123.518227] [ 123.518459] ctx_sched_out+0x8f1/0xc10 [ 123.518869] __perf_event_task_sched_out+0x6d0/0x18d0 [ 123.519347] ? lock_is_held_type+0xd7/0x130 [ 123.519782] ? __perf_cgroup_move+0x160/0x160 [ 123.520234] ? set_next_entity+0x304/0x550 [ 123.520665] ? lock_is_held_type+0xd7/0x130 [ 123.521104] __schedule+0xedd/0x2470 [ 123.521489] ? io_schedule_timeout+0x150/0x150 [ 123.521952] ? futex_wait_setup+0x166/0x230 [ 123.522355] schedule+0xda/0x1b0 [ 123.522697] futex_wait_queue+0xf5/0x1e0 [ 123.523109] futex_wait+0x28e/0x690 [ 123.523478] ? futex_wait_setup+0x230/0x230 [ 123.523887] ? wake_up_q+0x8b/0xf0 [ 123.524255] ? do_raw_spin_unlock+0x4f/0x220 [ 123.524709] ? futex_wake+0x158/0x490 [ 123.525102] ? fd_install+0x1f9/0x640 [ 123.525477] do_futex+0x2ff/0x380 [ 123.525838] ? __ia32_compat_sys_get_robust_list+0x3b0/0x3b0 [ 123.526412] __x64_sys_futex+0x1c6/0x4d0 [ 123.526831] ? __x64_sys_futex_time32+0x480/0x480 [ 123.527305] ? syscall_enter_from_user_mode+0x1d/0x50 [ 123.527823] ? syscall_enter_from_user_mode+0x1d/0x50 [ 123.528340] do_syscall_64+0x3b/0x90 [ 123.528724] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 123.529233] RIP: 0033:0x7fc34ffd5b19 [ 123.529608] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 123.531387] RSP: 002b:00007fc34d54b218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 123.532135] RAX: ffffffffffffffda RBX: 00007fc3500e8f68 RCX: 00007fc34ffd5b19 [ 123.532835] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fc3500e8f68 [ 123.533535] RBP: 00007fc3500e8f60 R08: 0000000000000000 R09: 0000000000000000 [ 123.534192] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc3500e8f6c [ 123.534894] R13: 00007fff03406e9f R14: 00007fc34d54b300 R15: 0000000000022000 [ 123.535602] [ 123.535838] irq event stamp: 1952 [ 123.536168] hardirqs last enabled at (1951): [] syscall_enter_from_user_mode+0x1d/0x50 [ 123.537104] hardirqs last disabled at (1952): [] __schedule+0x1225/0x2470 [ 123.537928] softirqs last enabled at (1216): [] __irq_exit_rcu+0x11b/0x180 [ 123.538781] softirqs last disabled at (1181): [] __irq_exit_rcu+0x11b/0x180 [ 123.539627] ---[ end trace 0000000000000000 ]--- 14:39:38 executing program 0: mlockall(0x2) 14:39:38 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, &(0x7f0000000240)) 14:39:38 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devpts\x00', 0x0, 0x0) r0 = inotify_init() r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x500000a) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x500) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:39:38 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc0189436, &(0x7f0000000000)) 14:39:38 executing program 5: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x4000) shmat(r0, &(0x7f0000ffd000/0x1000)=nil, 0x5000) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) 14:39:38 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[], 0x820) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0xfb, 0x16, 0x4, 0x7, "2a35603e7b266c3ac08bc86d576ecd03", "04"}, 0x16, 0x1) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r4, r3, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x4, 0x80, 0x0, 0x8, 0x5, 0x40, 0x0, 0x2000000000000, 0xa0600, 0x9, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000140), 0x4}, 0x10246, 0xe4, 0x7, 0x0, 0x7, 0xffff, 0x1, 0x0, 0x9, 0x0, 0x169}, r3, 0x3, 0xffffffffffffffff, 0xf) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000000)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) signalfd4(r5, &(0x7f0000000040)={[0x101]}, 0x8, 0x40000) ioctl$EXT4_IOC_CHECKPOINT(r4, 0x4004662b, &(0x7f0000000340)) 14:39:38 executing program 6: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000300)=[{&(0x7f0000000240)="bb", 0x1}], 0x1) vmsplice(r0, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) 14:39:38 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file1\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000580)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize}]}}) 14:39:38 executing program 6: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000300)=[{&(0x7f0000000240)="bb", 0x1}], 0x1) vmsplice(r0, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) 14:39:38 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file1\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000580)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize}]}}) 14:39:38 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devpts\x00', 0x0, 0x0) r0 = inotify_init() r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x500000a) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x500) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 125.969443] hrtimer: interrupt took 17242 ns 14:39:39 executing program 0: mlockall(0x2) 14:39:39 executing program 5: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x4000) shmat(r0, &(0x7f0000ffd000/0x1000)=nil, 0x5000) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) 14:39:39 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, &(0x7f0000000240)) 14:39:39 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devpts\x00', 0x0, 0x0) r0 = inotify_init() r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x500000a) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x500) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:39:39 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[], 0x820) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0xfb, 0x16, 0x4, 0x7, "2a35603e7b266c3ac08bc86d576ecd03", "04"}, 0x16, 0x1) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r4, r3, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x4, 0x80, 0x0, 0x8, 0x5, 0x40, 0x0, 0x2000000000000, 0xa0600, 0x9, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000140), 0x4}, 0x10246, 0xe4, 0x7, 0x0, 0x7, 0xffff, 0x1, 0x0, 0x9, 0x0, 0x169}, r3, 0x3, 0xffffffffffffffff, 0xf) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000000)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) signalfd4(r5, &(0x7f0000000040)={[0x101]}, 0x8, 0x40000) ioctl$EXT4_IOC_CHECKPOINT(r4, 0x4004662b, &(0x7f0000000340)) 14:39:39 executing program 6: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000300)=[{&(0x7f0000000240)="bb", 0x1}], 0x1) vmsplice(r0, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) 14:39:39 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc0189436, &(0x7f0000000000)) 14:39:39 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file1\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000580)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize}]}}) 14:39:39 executing program 0: mlockall(0x2) 14:39:39 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devpts\x00', 0x0, 0x0) r0 = inotify_init() r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x500000a) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x500) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:39:39 executing program 5: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x4000) shmat(r0, &(0x7f0000ffd000/0x1000)=nil, 0x5000) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) 14:39:39 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[], 0x820) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0xfb, 0x16, 0x4, 0x7, "2a35603e7b266c3ac08bc86d576ecd03", "04"}, 0x16, 0x1) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r4, r3, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x4, 0x80, 0x0, 0x8, 0x5, 0x40, 0x0, 0x2000000000000, 0xa0600, 0x9, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000140), 0x4}, 0x10246, 0xe4, 0x7, 0x0, 0x7, 0xffff, 0x1, 0x0, 0x9, 0x0, 0x169}, r3, 0x3, 0xffffffffffffffff, 0xf) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000000)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) signalfd4(r5, &(0x7f0000000040)={[0x101]}, 0x8, 0x40000) ioctl$EXT4_IOC_CHECKPOINT(r4, 0x4004662b, &(0x7f0000000340)) 14:39:39 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc0189436, &(0x7f0000000000)) 14:39:39 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000300)=[{&(0x7f0000000240)="bb", 0x1}], 0x1) vmsplice(r0, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) 14:39:39 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, &(0x7f0000000240)) 14:39:39 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devpts\x00', 0x0, 0x0) r0 = inotify_init() r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x500000a) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x500) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:39:39 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[], 0x820) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0xfb, 0x16, 0x4, 0x7, "2a35603e7b266c3ac08bc86d576ecd03", "04"}, 0x16, 0x1) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r4, r3, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x4, 0x80, 0x0, 0x8, 0x5, 0x40, 0x0, 0x2000000000000, 0xa0600, 0x9, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000140), 0x4}, 0x10246, 0xe4, 0x7, 0x0, 0x7, 0xffff, 0x1, 0x0, 0x9, 0x0, 0x169}, r3, 0x3, 0xffffffffffffffff, 0xf) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000000)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) signalfd4(r5, &(0x7f0000000040)={[0x101]}, 0x8, 0x40000) ioctl$EXT4_IOC_CHECKPOINT(r4, 0x4004662b, &(0x7f0000000340)) 14:39:39 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[], 0x820) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0xfb, 0x16, 0x4, 0x7, "2a35603e7b266c3ac08bc86d576ecd03", "04"}, 0x16, 0x1) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r4, r3, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x4, 0x80, 0x0, 0x8, 0x5, 0x40, 0x0, 0x2000000000000, 0xa0600, 0x9, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000140), 0x4}, 0x10246, 0xe4, 0x7, 0x0, 0x7, 0xffff, 0x1, 0x0, 0x9, 0x0, 0x169}, r3, 0x3, 0xffffffffffffffff, 0xf) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000000)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) signalfd4(r5, &(0x7f0000000040)={[0x101]}, 0x8, 0x40000) ioctl$EXT4_IOC_CHECKPOINT(r4, 0x4004662b, &(0x7f0000000340)) 14:39:39 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[], 0x820) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0xfb, 0x16, 0x4, 0x7, "2a35603e7b266c3ac08bc86d576ecd03", "04"}, 0x16, 0x1) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r4, r3, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x4, 0x80, 0x0, 0x8, 0x5, 0x40, 0x0, 0x2000000000000, 0xa0600, 0x9, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000140), 0x4}, 0x10246, 0xe4, 0x7, 0x0, 0x7, 0xffff, 0x1, 0x0, 0x9, 0x0, 0x169}, r3, 0x3, 0xffffffffffffffff, 0xf) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000000)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) signalfd4(r5, &(0x7f0000000040)={[0x101]}, 0x8, 0x40000) ioctl$EXT4_IOC_CHECKPOINT(r4, 0x4004662b, &(0x7f0000000340)) 14:39:39 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[], 0x820) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0xfb, 0x16, 0x4, 0x7, "2a35603e7b266c3ac08bc86d576ecd03", "04"}, 0x16, 0x1) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r4, r3, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x4, 0x80, 0x0, 0x8, 0x5, 0x40, 0x0, 0x2000000000000, 0xa0600, 0x9, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000140), 0x4}, 0x10246, 0xe4, 0x7, 0x0, 0x7, 0xffff, 0x1, 0x0, 0x9, 0x0, 0x169}, r3, 0x3, 0xffffffffffffffff, 0xf) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000000)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) signalfd4(r5, &(0x7f0000000040)={[0x101]}, 0x8, 0x40000) ioctl$EXT4_IOC_CHECKPOINT(r4, 0x4004662b, &(0x7f0000000340)) 14:39:39 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000300)=[{&(0x7f0000000240)="bb", 0x1}], 0x1) vmsplice(r0, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) 14:39:39 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[], 0x820) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0xfb, 0x16, 0x4, 0x7, "2a35603e7b266c3ac08bc86d576ecd03", "04"}, 0x16, 0x1) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r4, r3, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x4, 0x80, 0x0, 0x8, 0x5, 0x40, 0x0, 0x2000000000000, 0xa0600, 0x9, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000140), 0x4}, 0x10246, 0xe4, 0x7, 0x0, 0x7, 0xffff, 0x1, 0x0, 0x9, 0x0, 0x169}, r3, 0x3, 0xffffffffffffffff, 0xf) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000000)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) signalfd4(r5, &(0x7f0000000040)={[0x101]}, 0x8, 0x40000) ioctl$EXT4_IOC_CHECKPOINT(r4, 0x4004662b, &(0x7f0000000340)) 14:39:39 executing program 7: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x13, &(0x7f0000000600), 0x4) 14:39:39 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) io_setup(0x6, &(0x7f0000000000)) getresgid(0x0, 0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', 0x0, 0x54, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)='P', 0x1}], 0x1, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000100)={{0x1, 0x1, 0x1a}, './file0\x00'}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r2, &(0x7f0000000140)=[{&(0x7f0000000000)='P', 0x1}], 0x1, 0x0, 0x0) syz_open_dev$mouse(0x0, 0x9, 0x0) 14:39:39 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devpts\x00', 0x0, 0x0) r0 = inotify_init() r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x500000a) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x500) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 14:39:39 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[], 0x820) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0xfb, 0x16, 0x4, 0x7, "2a35603e7b266c3ac08bc86d576ecd03", "04"}, 0x16, 0x1) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r4, r3, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x4, 0x80, 0x0, 0x8, 0x5, 0x40, 0x0, 0x2000000000000, 0xa0600, 0x9, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000140), 0x4}, 0x10246, 0xe4, 0x7, 0x0, 0x7, 0xffff, 0x1, 0x0, 0x9, 0x0, 0x169}, r3, 0x3, 0xffffffffffffffff, 0xf) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000000)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) signalfd4(r5, &(0x7f0000000040)={[0x101]}, 0x8, 0x40000) ioctl$EXT4_IOC_CHECKPOINT(r4, 0x4004662b, &(0x7f0000000340)) [ 126.629647] autofs4:pid:4037:validate_dev_ioctl: path string terminator missing for cmd(0xc0189376) 14:39:39 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000300)=[{&(0x7f0000000240)="bb", 0x1}], 0x1) vmsplice(r0, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) 14:39:39 executing program 3: keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffa) [ 126.705336] autofs4:pid:4037:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1768304430.3237228), cmd(0xc0189376) [ 126.706405] autofs4:pid:4037:validate_dev_ioctl: invalid device control module version supplied for cmd(0xc0189376) 14:39:39 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[], 0x820) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0xfb, 0x16, 0x4, 0x7, "2a35603e7b266c3ac08bc86d576ecd03", "04"}, 0x16, 0x1) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r4, r3, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x4, 0x80, 0x0, 0x8, 0x5, 0x40, 0x0, 0x2000000000000, 0xa0600, 0x9, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000140), 0x4}, 0x10246, 0xe4, 0x7, 0x0, 0x7, 0xffff, 0x1, 0x0, 0x9, 0x0, 0x169}, r3, 0x3, 0xffffffffffffffff, 0xf) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000000)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) signalfd4(r5, &(0x7f0000000040)={[0x101]}, 0x8, 0x40000) ioctl$EXT4_IOC_CHECKPOINT(r4, 0x4004662b, &(0x7f0000000340)) 14:39:39 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) io_setup(0x6, &(0x7f0000000000)) getresgid(0x0, 0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', 0x0, 0x54, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)='P', 0x1}], 0x1, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000100)={{0x1, 0x1, 0x1a}, './file0\x00'}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r2, &(0x7f0000000140)=[{&(0x7f0000000000)='P', 0x1}], 0x1, 0x0, 0x0) syz_open_dev$mouse(0x0, 0x9, 0x0) 14:39:39 executing program 7: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x13, &(0x7f0000000600), 0x4) 14:39:39 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[], 0x820) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0xfb, 0x16, 0x4, 0x7, "2a35603e7b266c3ac08bc86d576ecd03", "04"}, 0x16, 0x1) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r4, r3, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x4, 0x80, 0x0, 0x8, 0x5, 0x40, 0x0, 0x2000000000000, 0xa0600, 0x9, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000140), 0x4}, 0x10246, 0xe4, 0x7, 0x0, 0x7, 0xffff, 0x1, 0x0, 0x9, 0x0, 0x169}, r3, 0x3, 0xffffffffffffffff, 0xf) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000000)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) signalfd4(r5, &(0x7f0000000040)={[0x101]}, 0x8, 0x40000) ioctl$EXT4_IOC_CHECKPOINT(r4, 0x4004662b, &(0x7f0000000340)) 14:39:39 executing program 3: keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffa) 14:39:39 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x4a903) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000080)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "eccc5893c39cb6103f06595e89324b3081b508b6e3cf62f694fa32926f611a8fee0861ed9ea5f29b189ec6b3598208444a7b94a606c5a787d8febc4a1b910155", "ede60fbbd0fa22f9295e8493274e0f92e318b037afc794b1e89334d9e3986483"}) 14:39:39 executing program 0: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000080)="9b2548ddbd48e33b72fa27de4a3a76ed201b4f478d5d24f28d5c9978ebcab8a2f212f8ed2e513c23a264f5ead6baa321155aced7a08c0715ea90444492", 0x3d, 0x9}], 0x204000, &(0x7f0000000140)={[{@utf8}], [{@seclabel}, {@hash}, {@hash}, {@fowner_gt={'fowner>', 0xee01}}, {@audit}, {@uid_gt={'uid>', 0xee00}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@context={'context', 0x3d, 'unconfined_u'}}]}) faccessat2(r0, &(0x7f0000000200)='./file0\x00', 0x60, 0x1300) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x240100, 0x80) unlinkat(r1, &(0x7f00000002c0)='./file0\x00', 0x200) shmget(0x2, 0x1000, 0x78000000, &(0x7f0000ffe000/0x1000)=nil) r2 = syz_mount_image$iso9660(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x1, 0x1, &(0x7f0000000480)=[{&(0x7f0000000380)="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", 0xfe, 0x4}], 0x1004000, &(0x7f00000004c0)={[{@unhide}, {@cruft}], [{@fsname={'fsname', 0x3d, '+^'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000500)) fchownat(r1, &(0x7f0000000540)='./file1\x00', 0x0, 0x0, 0x0) socketpair(0x2b, 0x0, 0x3b1, &(0x7f00000005c0)) 14:39:39 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000008980)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f00000004c0)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ssrr={0x89, 0x8, 0x4, [@local]}]}}}], 0x18}}], 0x1, 0x0) [ 126.896641] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 14:39:39 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x371}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000c40)=""/134, 0x86}, {&(0x7f0000000b00)=""/118, 0x76}], 0x2) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) ioctl$CDROMREADMODE1(r2, 0x40081271, &(0x7f0000000080)={0x0, 0x4}) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000b80)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="df000000000000000000c00cc0626f609eb43078ab7f00eb45587236a893d18babf16a146d180e0081c8dfb8ffe6a56daadeac1c24fa6ebf4757d559d6a008a567f595d882eb5a28"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff5e8, 0x8000, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x9}, 0x0, 0x4, 0x1, 0x7, 0x9, 0x4d, 0x4, 0x0, 0x5, 0x0, 0x5}, 0x0, 0xb, 0xffffffffffffffff, 0xb) r3 = getpgid(0x0) ptrace(0x8, r3) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000e372000008001a7074150b00"], 0x1c}}, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') 14:39:39 executing program 7: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x13, &(0x7f0000000600), 0x4) 14:39:40 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000008980)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f00000004c0)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ssrr={0x89, 0x8, 0x4, [@local]}]}}}], 0x18}}], 0x1, 0x0) 14:39:40 executing program 3: keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffa) 14:39:40 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x4a903) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000080)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "eccc5893c39cb6103f06595e89324b3081b508b6e3cf62f694fa32926f611a8fee0861ed9ea5f29b189ec6b3598208444a7b94a606c5a787d8febc4a1b910155", "ede60fbbd0fa22f9295e8493274e0f92e318b037afc794b1e89334d9e3986483"}) [ 126.992213] autofs4:pid:4052:validate_dev_ioctl: path string terminator missing for cmd(0xc0189376) 14:39:40 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[], 0x820) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000200), &(0x7f0000000240)={0x0, 0xfb, 0x16, 0x4, 0x7, "2a35603e7b266c3ac08bc86d576ecd03", "04"}, 0x16, 0x1) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r4, r3, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x4, 0x80, 0x0, 0x8, 0x5, 0x40, 0x0, 0x2000000000000, 0xa0600, 0x9, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000140), 0x4}, 0x10246, 0xe4, 0x7, 0x0, 0x7, 0xffff, 0x1, 0x0, 0x9, 0x0, 0x169}, r3, 0x3, 0xffffffffffffffff, 0xf) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000000)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) signalfd4(r5, &(0x7f0000000040)={[0x101]}, 0x8, 0x40000) ioctl$EXT4_IOC_CHECKPOINT(r4, 0x4004662b, &(0x7f0000000340)) 14:39:40 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) io_setup(0x6, &(0x7f0000000000)) getresgid(0x0, 0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', 0x0, 0x54, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)='P', 0x1}], 0x1, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000100)={{0x1, 0x1, 0x1a}, './file0\x00'}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r2, &(0x7f0000000140)=[{&(0x7f0000000000)='P', 0x1}], 0x1, 0x0, 0x0) syz_open_dev$mouse(0x0, 0x9, 0x0) 14:39:40 executing program 3: keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffa) [ 127.080278] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 14:39:40 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000008980)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f00000004c0)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ssrr={0x89, 0x8, 0x4, [@local]}]}}}], 0x18}}], 0x1, 0x0) [ 127.154404] autofs4:pid:4080:validate_dev_ioctl: path string terminator missing for cmd(0xc0189376) 14:39:40 executing program 7: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x13, &(0x7f0000000600), 0x4) 14:39:40 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x4a903) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000080)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "eccc5893c39cb6103f06595e89324b3081b508b6e3cf62f694fa32926f611a8fee0861ed9ea5f29b189ec6b3598208444a7b94a606c5a787d8febc4a1b910155", "ede60fbbd0fa22f9295e8493274e0f92e318b037afc794b1e89334d9e3986483"}) 14:39:40 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000008980)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f00000004c0)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ssrr={0x89, 0x8, 0x4, [@local]}]}}}], 0x18}}], 0x1, 0x0) 14:39:40 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x371}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000c40)=""/134, 0x86}, {&(0x7f0000000b00)=""/118, 0x76}], 0x2) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) ioctl$CDROMREADMODE1(r2, 0x40081271, &(0x7f0000000080)={0x0, 0x4}) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000b80)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="df000000000000000000c00cc0626f609eb43078ab7f00eb45587236a893d18babf16a146d180e0081c8dfb8ffe6a56daadeac1c24fa6ebf4757d559d6a008a567f595d882eb5a28"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff5e8, 0x8000, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x9}, 0x0, 0x4, 0x1, 0x7, 0x9, 0x4d, 0x4, 0x0, 0x5, 0x0, 0x5}, 0x0, 0xb, 0xffffffffffffffff, 0xb) r3 = getpgid(0x0) ptrace(0x8, r3) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000e372000008001a7074150b00"], 0x1c}}, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') 14:39:40 executing program 0: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000080)="9b2548ddbd48e33b72fa27de4a3a76ed201b4f478d5d24f28d5c9978ebcab8a2f212f8ed2e513c23a264f5ead6baa321155aced7a08c0715ea90444492", 0x3d, 0x9}], 0x204000, &(0x7f0000000140)={[{@utf8}], [{@seclabel}, {@hash}, {@hash}, {@fowner_gt={'fowner>', 0xee01}}, {@audit}, {@uid_gt={'uid>', 0xee00}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@context={'context', 0x3d, 'unconfined_u'}}]}) faccessat2(r0, &(0x7f0000000200)='./file0\x00', 0x60, 0x1300) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x240100, 0x80) unlinkat(r1, &(0x7f00000002c0)='./file0\x00', 0x200) shmget(0x2, 0x1000, 0x78000000, &(0x7f0000ffe000/0x1000)=nil) r2 = syz_mount_image$iso9660(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x1, 0x1, &(0x7f0000000480)=[{&(0x7f0000000380)="37052236d4c6f73bcbaff1b5c8e72f6f481f76aecc46c7f802f062b56a07f5de5187cbeb8d3c754497d162f35f96a794d05fe79585b37a94ef31323d7c9c28331fe42ff1dfacac5b640057e1150ffac09662b04ef6c1351a4ec2d414a1c923017d6f455950c3f86a15992f6e124ac0a4a12d109cef909f4862f9b359dd6ea668ded0dc36a0703121f0ac2679b596f019c4d9d8dc4347a26f9427b1e78452aca2cc4d61004c7849780c260849bb65e9373a9456e564635d41b14453f9c7c9a64529371bedae23e8fe30f15de7e4c130d805e97e16c040cbd0aa736192202efc20181f98c46f6c54c0c79b0e5e3a4bad41a2658950efd1ee021d9c52fd00aa", 0xfe, 0x4}], 0x1004000, &(0x7f00000004c0)={[{@unhide}, {@cruft}], [{@fsname={'fsname', 0x3d, '+^'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000500)) fchownat(r1, &(0x7f0000000540)='./file1\x00', 0x0, 0x0, 0x0) socketpair(0x2b, 0x0, 0x3b1, &(0x7f00000005c0)) 14:39:40 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) io_setup(0x6, &(0x7f0000000000)) getresgid(0x0, 0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', 0x0, 0x54, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)='P', 0x1}], 0x1, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000100)={{0x1, 0x1, 0x1a}, './file0\x00'}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r2, &(0x7f0000000140)=[{&(0x7f0000000000)='P', 0x1}], 0x1, 0x0, 0x0) syz_open_dev$mouse(0x0, 0x9, 0x0) 14:39:40 executing program 3: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000080)="9b2548ddbd48e33b72fa27de4a3a76ed201b4f478d5d24f28d5c9978ebcab8a2f212f8ed2e513c23a264f5ead6baa321155aced7a08c0715ea90444492", 0x3d, 0x9}], 0x204000, &(0x7f0000000140)={[{@utf8}], [{@seclabel}, {@hash}, {@hash}, {@fowner_gt={'fowner>', 0xee01}}, {@audit}, {@uid_gt={'uid>', 0xee00}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@context={'context', 0x3d, 'unconfined_u'}}]}) faccessat2(r0, &(0x7f0000000200)='./file0\x00', 0x60, 0x1300) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x240100, 0x80) unlinkat(r1, &(0x7f00000002c0)='./file0\x00', 0x200) shmget(0x2, 0x1000, 0x78000000, &(0x7f0000ffe000/0x1000)=nil) r2 = syz_mount_image$iso9660(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x1, 0x1, &(0x7f0000000480)=[{&(0x7f0000000380)="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", 0xfe, 0x4}], 0x1004000, &(0x7f00000004c0)={[{@unhide}, {@cruft}], [{@fsname={'fsname', 0x3d, '+^'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000500)) fchownat(r1, &(0x7f0000000540)='./file1\x00', 0x0, 0x0, 0x0) socketpair(0x2b, 0x0, 0x3b1, &(0x7f00000005c0)) [ 127.287587] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 14:39:40 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000080)="9b2548ddbd48e33b72fa27de4a3a76ed201b4f478d5d24f28d5c9978ebcab8a2f212f8ed2e513c23a264f5ead6baa321155aced7a08c0715ea90444492", 0x3d, 0x9}], 0x204000, &(0x7f0000000140)={[{@utf8}], [{@seclabel}, {@hash}, {@hash}, {@fowner_gt={'fowner>', 0xee01}}, {@audit}, {@uid_gt={'uid>', 0xee00}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@context={'context', 0x3d, 'unconfined_u'}}]}) faccessat2(r0, &(0x7f0000000200)='./file0\x00', 0x60, 0x1300) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x240100, 0x80) unlinkat(r1, &(0x7f00000002c0)='./file0\x00', 0x200) shmget(0x2, 0x1000, 0x78000000, &(0x7f0000ffe000/0x1000)=nil) r2 = syz_mount_image$iso9660(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x1, 0x1, &(0x7f0000000480)=[{&(0x7f0000000380)="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", 0xfe, 0x4}], 0x1004000, &(0x7f00000004c0)={[{@unhide}, {@cruft}], [{@fsname={'fsname', 0x3d, '+^'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000500)) fchownat(r1, &(0x7f0000000540)='./file1\x00', 0x0, 0x0, 0x0) socketpair(0x2b, 0x0, 0x3b1, &(0x7f00000005c0)) [ 127.323521] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 [ 127.330214] autofs4:pid:4100:validate_dev_ioctl: path string terminator missing for cmd(0xc0189376) [ 127.332116] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 14:39:40 executing program 7: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000080)="9b2548ddbd48e33b72fa27de4a3a76ed201b4f478d5d24f28d5c9978ebcab8a2f212f8ed2e513c23a264f5ead6baa321155aced7a08c0715ea90444492", 0x3d, 0x9}], 0x204000, &(0x7f0000000140)={[{@utf8}], [{@seclabel}, {@hash}, {@hash}, {@fowner_gt={'fowner>', 0xee01}}, {@audit}, {@uid_gt={'uid>', 0xee00}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@context={'context', 0x3d, 'unconfined_u'}}]}) faccessat2(r0, &(0x7f0000000200)='./file0\x00', 0x60, 0x1300) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x240100, 0x80) unlinkat(r1, &(0x7f00000002c0)='./file0\x00', 0x200) shmget(0x2, 0x1000, 0x78000000, &(0x7f0000ffe000/0x1000)=nil) r2 = syz_mount_image$iso9660(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x1, 0x1, &(0x7f0000000480)=[{&(0x7f0000000380)="37052236d4c6f73bcbaff1b5c8e72f6f481f76aecc46c7f802f062b56a07f5de5187cbeb8d3c754497d162f35f96a794d05fe79585b37a94ef31323d7c9c28331fe42ff1dfacac5b640057e1150ffac09662b04ef6c1351a4ec2d414a1c923017d6f455950c3f86a15992f6e124ac0a4a12d109cef909f4862f9b359dd6ea668ded0dc36a0703121f0ac2679b596f019c4d9d8dc4347a26f9427b1e78452aca2cc4d61004c7849780c260849bb65e9373a9456e564635d41b14453f9c7c9a64529371bedae23e8fe30f15de7e4c130d805e97e16c040cbd0aa736192202efc20181f98c46f6c54c0c79b0e5e3a4bad41a2658950efd1ee021d9c52fd00aa", 0xfe, 0x4}], 0x1004000, &(0x7f00000004c0)={[{@unhide}, {@cruft}], [{@fsname={'fsname', 0x3d, '+^'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000500)) fchownat(r1, &(0x7f0000000540)='./file1\x00', 0x0, 0x0, 0x0) socketpair(0x2b, 0x0, 0x3b1, &(0x7f00000005c0)) [ 127.356796] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 14:39:40 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x4a903) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000080)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "eccc5893c39cb6103f06595e89324b3081b508b6e3cf62f694fa32926f611a8fee0861ed9ea5f29b189ec6b3598208444a7b94a606c5a787d8febc4a1b910155", "ede60fbbd0fa22f9295e8493274e0f92e318b037afc794b1e89334d9e3986483"}) 14:39:40 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x371}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000c40)=""/134, 0x86}, {&(0x7f0000000b00)=""/118, 0x76}], 0x2) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) ioctl$CDROMREADMODE1(r2, 0x40081271, &(0x7f0000000080)={0x0, 0x4}) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000b80)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="df000000000000000000c00cc0626f609eb43078ab7f00eb45587236a893d18babf16a146d180e0081c8dfb8ffe6a56daadeac1c24fa6ebf4757d559d6a008a567f595d882eb5a28"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff5e8, 0x8000, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x9}, 0x0, 0x4, 0x1, 0x7, 0x9, 0x4d, 0x4, 0x0, 0x5, 0x0, 0x5}, 0x0, 0xb, 0xffffffffffffffff, 0xb) r3 = getpgid(0x0) ptrace(0x8, r3) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000e372000008001a7074150b00"], 0x1c}}, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') 14:39:40 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000080)="9b2548ddbd48e33b72fa27de4a3a76ed201b4f478d5d24f28d5c9978ebcab8a2f212f8ed2e513c23a264f5ead6baa321155aced7a08c0715ea90444492", 0x3d, 0x9}], 0x204000, &(0x7f0000000140)={[{@utf8}], [{@seclabel}, {@hash}, {@hash}, {@fowner_gt={'fowner>', 0xee01}}, {@audit}, {@uid_gt={'uid>', 0xee00}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@context={'context', 0x3d, 'unconfined_u'}}]}) faccessat2(r0, &(0x7f0000000200)='./file0\x00', 0x60, 0x1300) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x240100, 0x80) unlinkat(r1, &(0x7f00000002c0)='./file0\x00', 0x200) shmget(0x2, 0x1000, 0x78000000, &(0x7f0000ffe000/0x1000)=nil) r2 = syz_mount_image$iso9660(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x1, 0x1, &(0x7f0000000480)=[{&(0x7f0000000380)="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", 0xfe, 0x4}], 0x1004000, &(0x7f00000004c0)={[{@unhide}, {@cruft}], [{@fsname={'fsname', 0x3d, '+^'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000500)) fchownat(r1, &(0x7f0000000540)='./file1\x00', 0x0, 0x0, 0x0) socketpair(0x2b, 0x0, 0x3b1, &(0x7f00000005c0)) [ 127.497852] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 14:39:40 executing program 7: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000080)="9b2548ddbd48e33b72fa27de4a3a76ed201b4f478d5d24f28d5c9978ebcab8a2f212f8ed2e513c23a264f5ead6baa321155aced7a08c0715ea90444492", 0x3d, 0x9}], 0x204000, &(0x7f0000000140)={[{@utf8}], [{@seclabel}, {@hash}, {@hash}, {@fowner_gt={'fowner>', 0xee01}}, {@audit}, {@uid_gt={'uid>', 0xee00}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@context={'context', 0x3d, 'unconfined_u'}}]}) faccessat2(r0, &(0x7f0000000200)='./file0\x00', 0x60, 0x1300) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x240100, 0x80) unlinkat(r1, &(0x7f00000002c0)='./file0\x00', 0x200) shmget(0x2, 0x1000, 0x78000000, &(0x7f0000ffe000/0x1000)=nil) r2 = syz_mount_image$iso9660(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x1, 0x1, &(0x7f0000000480)=[{&(0x7f0000000380)="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", 0xfe, 0x4}], 0x1004000, &(0x7f00000004c0)={[{@unhide}, {@cruft}], [{@fsname={'fsname', 0x3d, '+^'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000500)) fchownat(r1, &(0x7f0000000540)='./file1\x00', 0x0, 0x0, 0x0) socketpair(0x2b, 0x0, 0x3b1, &(0x7f00000005c0)) 14:39:40 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x371}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000c40)=""/134, 0x86}, {&(0x7f0000000b00)=""/118, 0x76}], 0x2) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) ioctl$CDROMREADMODE1(r2, 0x40081271, &(0x7f0000000080)={0x0, 0x4}) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000b80)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="df000000000000000000c00cc0626f609eb43078ab7f00eb45587236a893d18babf16a146d180e0081c8dfb8ffe6a56daadeac1c24fa6ebf4757d559d6a008a567f595d882eb5a28"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff5e8, 0x8000, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x9}, 0x0, 0x4, 0x1, 0x7, 0x9, 0x4d, 0x4, 0x0, 0x5, 0x0, 0x5}, 0x0, 0xb, 0xffffffffffffffff, 0xb) r3 = getpgid(0x0) ptrace(0x8, r3) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000e372000008001a7074150b00"], 0x1c}}, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') 14:39:40 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x371}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000c40)=""/134, 0x86}, {&(0x7f0000000b00)=""/118, 0x76}], 0x2) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) ioctl$CDROMREADMODE1(r2, 0x40081271, &(0x7f0000000080)={0x0, 0x4}) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000b80)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="df000000000000000000c00cc0626f609eb43078ab7f00eb45587236a893d18babf16a146d180e0081c8dfb8ffe6a56daadeac1c24fa6ebf4757d559d6a008a567f595d882eb5a28"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff5e8, 0x8000, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x9}, 0x0, 0x4, 0x1, 0x7, 0x9, 0x4d, 0x4, 0x0, 0x5, 0x0, 0x5}, 0x0, 0xb, 0xffffffffffffffff, 0xb) r3 = getpgid(0x0) ptrace(0x8, r3) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000e372000008001a7074150b00"], 0x1c}}, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') [ 127.729053] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 [ 127.732296] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 [ 127.735392] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 14:39:40 executing program 0: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000080)="9b2548ddbd48e33b72fa27de4a3a76ed201b4f478d5d24f28d5c9978ebcab8a2f212f8ed2e513c23a264f5ead6baa321155aced7a08c0715ea90444492", 0x3d, 0x9}], 0x204000, &(0x7f0000000140)={[{@utf8}], [{@seclabel}, {@hash}, {@hash}, {@fowner_gt={'fowner>', 0xee01}}, {@audit}, {@uid_gt={'uid>', 0xee00}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@context={'context', 0x3d, 'unconfined_u'}}]}) faccessat2(r0, &(0x7f0000000200)='./file0\x00', 0x60, 0x1300) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x240100, 0x80) unlinkat(r1, &(0x7f00000002c0)='./file0\x00', 0x200) shmget(0x2, 0x1000, 0x78000000, &(0x7f0000ffe000/0x1000)=nil) r2 = syz_mount_image$iso9660(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x1, 0x1, &(0x7f0000000480)=[{&(0x7f0000000380)="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", 0xfe, 0x4}], 0x1004000, &(0x7f00000004c0)={[{@unhide}, {@cruft}], [{@fsname={'fsname', 0x3d, '+^'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000500)) fchownat(r1, &(0x7f0000000540)='./file1\x00', 0x0, 0x0, 0x0) socketpair(0x2b, 0x0, 0x3b1, &(0x7f00000005c0)) 14:39:40 executing program 3: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000080)="9b2548ddbd48e33b72fa27de4a3a76ed201b4f478d5d24f28d5c9978ebcab8a2f212f8ed2e513c23a264f5ead6baa321155aced7a08c0715ea90444492", 0x3d, 0x9}], 0x204000, &(0x7f0000000140)={[{@utf8}], [{@seclabel}, {@hash}, {@hash}, {@fowner_gt={'fowner>', 0xee01}}, {@audit}, {@uid_gt={'uid>', 0xee00}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@context={'context', 0x3d, 'unconfined_u'}}]}) faccessat2(r0, &(0x7f0000000200)='./file0\x00', 0x60, 0x1300) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x240100, 0x80) unlinkat(r1, &(0x7f00000002c0)='./file0\x00', 0x200) shmget(0x2, 0x1000, 0x78000000, &(0x7f0000ffe000/0x1000)=nil) r2 = syz_mount_image$iso9660(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x1, 0x1, &(0x7f0000000480)=[{&(0x7f0000000380)="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", 0xfe, 0x4}], 0x1004000, &(0x7f00000004c0)={[{@unhide}, {@cruft}], [{@fsname={'fsname', 0x3d, '+^'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000500)) fchownat(r1, &(0x7f0000000540)='./file1\x00', 0x0, 0x0, 0x0) socketpair(0x2b, 0x0, 0x3b1, &(0x7f00000005c0)) 14:39:40 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x371}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000c40)=""/134, 0x86}, {&(0x7f0000000b00)=""/118, 0x76}], 0x2) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) ioctl$CDROMREADMODE1(r2, 0x40081271, &(0x7f0000000080)={0x0, 0x4}) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000b80)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="df000000000000000000c00cc0626f609eb43078ab7f00eb45587236a893d18babf16a146d180e0081c8dfb8ffe6a56daadeac1c24fa6ebf4757d559d6a008a567f595d882eb5a28"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff5e8, 0x8000, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x9}, 0x0, 0x4, 0x1, 0x7, 0x9, 0x4d, 0x4, 0x0, 0x5, 0x0, 0x5}, 0x0, 0xb, 0xffffffffffffffff, 0xb) r3 = getpgid(0x0) ptrace(0x8, r3) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000e372000008001a7074150b00"], 0x1c}}, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') 14:39:40 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x371}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000c40)=""/134, 0x86}, {&(0x7f0000000b00)=""/118, 0x76}], 0x2) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) ioctl$CDROMREADMODE1(r2, 0x40081271, &(0x7f0000000080)={0x0, 0x4}) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000b80)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="df000000000000000000c00cc0626f609eb43078ab7f00eb45587236a893d18babf16a146d180e0081c8dfb8ffe6a56daadeac1c24fa6ebf4757d559d6a008a567f595d882eb5a28"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff5e8, 0x8000, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x9}, 0x0, 0x4, 0x1, 0x7, 0x9, 0x4d, 0x4, 0x0, 0x5, 0x0, 0x5}, 0x0, 0xb, 0xffffffffffffffff, 0xb) r3 = getpgid(0x0) ptrace(0x8, r3) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000e372000008001a7074150b00"], 0x1c}}, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') 14:39:40 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000080)="9b2548ddbd48e33b72fa27de4a3a76ed201b4f478d5d24f28d5c9978ebcab8a2f212f8ed2e513c23a264f5ead6baa321155aced7a08c0715ea90444492", 0x3d, 0x9}], 0x204000, &(0x7f0000000140)={[{@utf8}], [{@seclabel}, {@hash}, {@hash}, {@fowner_gt={'fowner>', 0xee01}}, {@audit}, {@uid_gt={'uid>', 0xee00}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@context={'context', 0x3d, 'unconfined_u'}}]}) faccessat2(r0, &(0x7f0000000200)='./file0\x00', 0x60, 0x1300) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x240100, 0x80) unlinkat(r1, &(0x7f00000002c0)='./file0\x00', 0x200) shmget(0x2, 0x1000, 0x78000000, &(0x7f0000ffe000/0x1000)=nil) r2 = syz_mount_image$iso9660(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x1, 0x1, &(0x7f0000000480)=[{&(0x7f0000000380)="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", 0xfe, 0x4}], 0x1004000, &(0x7f00000004c0)={[{@unhide}, {@cruft}], [{@fsname={'fsname', 0x3d, '+^'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000500)) fchownat(r1, &(0x7f0000000540)='./file1\x00', 0x0, 0x0, 0x0) socketpair(0x2b, 0x0, 0x3b1, &(0x7f00000005c0)) [ 127.739509] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 14:39:40 executing program 7: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000080)="9b2548ddbd48e33b72fa27de4a3a76ed201b4f478d5d24f28d5c9978ebcab8a2f212f8ed2e513c23a264f5ead6baa321155aced7a08c0715ea90444492", 0x3d, 0x9}], 0x204000, &(0x7f0000000140)={[{@utf8}], [{@seclabel}, {@hash}, {@hash}, {@fowner_gt={'fowner>', 0xee01}}, {@audit}, {@uid_gt={'uid>', 0xee00}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@context={'context', 0x3d, 'unconfined_u'}}]}) faccessat2(r0, &(0x7f0000000200)='./file0\x00', 0x60, 0x1300) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x240100, 0x80) unlinkat(r1, &(0x7f00000002c0)='./file0\x00', 0x200) shmget(0x2, 0x1000, 0x78000000, &(0x7f0000ffe000/0x1000)=nil) r2 = syz_mount_image$iso9660(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x1, 0x1, &(0x7f0000000480)=[{&(0x7f0000000380)="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", 0xfe, 0x4}], 0x1004000, &(0x7f00000004c0)={[{@unhide}, {@cruft}], [{@fsname={'fsname', 0x3d, '+^'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000500)) fchownat(r1, &(0x7f0000000540)='./file1\x00', 0x0, 0x0, 0x0) socketpair(0x2b, 0x0, 0x3b1, &(0x7f00000005c0)) 14:39:40 executing program 5: ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f00000008c0)) 14:39:40 executing program 0: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000080)="9b2548ddbd48e33b72fa27de4a3a76ed201b4f478d5d24f28d5c9978ebcab8a2f212f8ed2e513c23a264f5ead6baa321155aced7a08c0715ea90444492", 0x3d, 0x9}], 0x204000, &(0x7f0000000140)={[{@utf8}], [{@seclabel}, {@hash}, {@hash}, {@fowner_gt={'fowner>', 0xee01}}, {@audit}, {@uid_gt={'uid>', 0xee00}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@context={'context', 0x3d, 'unconfined_u'}}]}) faccessat2(r0, &(0x7f0000000200)='./file0\x00', 0x60, 0x1300) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x240100, 0x80) unlinkat(r1, &(0x7f00000002c0)='./file0\x00', 0x200) shmget(0x2, 0x1000, 0x78000000, &(0x7f0000ffe000/0x1000)=nil) r2 = syz_mount_image$iso9660(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x1, 0x1, &(0x7f0000000480)=[{&(0x7f0000000380)="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", 0xfe, 0x4}], 0x1004000, &(0x7f00000004c0)={[{@unhide}, {@cruft}], [{@fsname={'fsname', 0x3d, '+^'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000500)) fchownat(r1, &(0x7f0000000540)='./file1\x00', 0x0, 0x0, 0x0) socketpair(0x2b, 0x0, 0x3b1, &(0x7f00000005c0)) [ 127.928696] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 14:39:40 executing program 3: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000080)="9b2548ddbd48e33b72fa27de4a3a76ed201b4f478d5d24f28d5c9978ebcab8a2f212f8ed2e513c23a264f5ead6baa321155aced7a08c0715ea90444492", 0x3d, 0x9}], 0x204000, &(0x7f0000000140)={[{@utf8}], [{@seclabel}, {@hash}, {@hash}, {@fowner_gt={'fowner>', 0xee01}}, {@audit}, {@uid_gt={'uid>', 0xee00}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@context={'context', 0x3d, 'unconfined_u'}}]}) faccessat2(r0, &(0x7f0000000200)='./file0\x00', 0x60, 0x1300) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x240100, 0x80) unlinkat(r1, &(0x7f00000002c0)='./file0\x00', 0x200) shmget(0x2, 0x1000, 0x78000000, &(0x7f0000ffe000/0x1000)=nil) r2 = syz_mount_image$iso9660(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x1, 0x1, &(0x7f0000000480)=[{&(0x7f0000000380)="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", 0xfe, 0x4}], 0x1004000, &(0x7f00000004c0)={[{@unhide}, {@cruft}], [{@fsname={'fsname', 0x3d, '+^'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000500)) fchownat(r1, &(0x7f0000000540)='./file1\x00', 0x0, 0x0, 0x0) socketpair(0x2b, 0x0, 0x3b1, &(0x7f00000005c0)) [ 127.976817] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 [ 127.984520] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 14:39:41 executing program 5: ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f00000008c0)) 14:39:41 executing program 0: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat2(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x18) 14:39:41 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x371}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000c40)=""/134, 0x86}, {&(0x7f0000000b00)=""/118, 0x76}], 0x2) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) ioctl$CDROMREADMODE1(r2, 0x40081271, &(0x7f0000000080)={0x0, 0x4}) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000b80)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="df000000000000000000c00cc0626f609eb43078ab7f00eb45587236a893d18babf16a146d180e0081c8dfb8ffe6a56daadeac1c24fa6ebf4757d559d6a008a567f595d882eb5a28"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff5e8, 0x8000, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x9}, 0x0, 0x4, 0x1, 0x7, 0x9, 0x4d, 0x4, 0x0, 0x5, 0x0, 0x5}, 0x0, 0xb, 0xffffffffffffffff, 0xb) r3 = getpgid(0x0) ptrace(0x8, r3) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000e372000008001a7074150b00"], 0x1c}}, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') 14:39:41 executing program 0: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat2(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x18) 14:39:41 executing program 5: ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f00000008c0)) 14:39:41 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x371}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000c40)=""/134, 0x86}, {&(0x7f0000000b00)=""/118, 0x76}], 0x2) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) ioctl$CDROMREADMODE1(r2, 0x40081271, &(0x7f0000000080)={0x0, 0x4}) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000b80)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="df000000000000000000c00cc0626f609eb43078ab7f00eb45587236a893d18babf16a146d180e0081c8dfb8ffe6a56daadeac1c24fa6ebf4757d559d6a008a567f595d882eb5a28"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff5e8, 0x8000, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x9}, 0x0, 0x4, 0x1, 0x7, 0x9, 0x4d, 0x4, 0x0, 0x5, 0x0, 0x5}, 0x0, 0xb, 0xffffffffffffffff, 0xb) r3 = getpgid(0x0) ptrace(0x8, r3) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000e372000008001a7074150b00"], 0x1c}}, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') 14:39:41 executing program 7: add_key(&(0x7f0000000780)='id_legacy\x00', &(0x7f00000007c0)={'syz', 0x0}, &(0x7f0000000800)="8b", 0x1, 0xfffffffffffffffb) 14:39:41 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$IEEE802154_ASSOCIATE_REQ(r1, 0x0, 0x0) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) 14:39:41 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x371}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000c40)=""/134, 0x86}, {&(0x7f0000000b00)=""/118, 0x76}], 0x2) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) ioctl$CDROMREADMODE1(r2, 0x40081271, &(0x7f0000000080)={0x0, 0x4}) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000b80)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="df000000000000000000c00cc0626f609eb43078ab7f00eb45587236a893d18babf16a146d180e0081c8dfb8ffe6a56daadeac1c24fa6ebf4757d559d6a008a567f595d882eb5a28"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff5e8, 0x8000, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x9}, 0x0, 0x4, 0x1, 0x7, 0x9, 0x4d, 0x4, 0x0, 0x5, 0x0, 0x5}, 0x0, 0xb, 0xffffffffffffffff, 0xb) r3 = getpgid(0x0) ptrace(0x8, r3) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000e372000008001a7074150b00"], 0x1c}}, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') 14:39:41 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x371}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000c40)=""/134, 0x86}, {&(0x7f0000000b00)=""/118, 0x76}], 0x2) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) ioctl$CDROMREADMODE1(r2, 0x40081271, &(0x7f0000000080)={0x0, 0x4}) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000b80)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="df000000000000000000c00cc0626f609eb43078ab7f00eb45587236a893d18babf16a146d180e0081c8dfb8ffe6a56daadeac1c24fa6ebf4757d559d6a008a567f595d882eb5a28"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff5e8, 0x8000, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x9}, 0x0, 0x4, 0x1, 0x7, 0x9, 0x4d, 0x4, 0x0, 0x5, 0x0, 0x5}, 0x0, 0xb, 0xffffffffffffffff, 0xb) r3 = getpgid(0x0) ptrace(0x8, r3) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000e372000008001a7074150b00"], 0x1c}}, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') 14:39:41 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x371}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000c40)=""/134, 0x86}, {&(0x7f0000000b00)=""/118, 0x76}], 0x2) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) ioctl$CDROMREADMODE1(r2, 0x40081271, &(0x7f0000000080)={0x0, 0x4}) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000b80)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="df000000000000000000c00cc0626f609eb43078ab7f00eb45587236a893d18babf16a146d180e0081c8dfb8ffe6a56daadeac1c24fa6ebf4757d559d6a008a567f595d882eb5a28"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff5e8, 0x8000, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x9}, 0x0, 0x4, 0x1, 0x7, 0x9, 0x4d, 0x4, 0x0, 0x5, 0x0, 0x5}, 0x0, 0xb, 0xffffffffffffffff, 0xb) r3 = getpgid(0x0) ptrace(0x8, r3) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000e372000008001a7074150b00"], 0x1c}}, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') 14:39:41 executing program 0: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat2(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x18) 14:39:41 executing program 5: ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f00000008c0)) 14:39:41 executing program 0: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat2(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x18) 14:39:41 executing program 7: syz_emit_ethernet(0x3e, &(0x7f0000000140)={@local, @dev, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "b0e0ee", 0x8, 0x0, 0x0, @private0, @mcast2, {[@routing={0x0, 0x0, 0x1}]}}}}}, 0x0) 14:39:41 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$IEEE802154_ASSOCIATE_REQ(r1, 0x0, 0x0) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) 14:39:41 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$IEEE802154_ASSOCIATE_REQ(r1, 0x0, 0x0) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) 14:39:41 executing program 7: syz_emit_ethernet(0x3e, &(0x7f0000000140)={@local, @dev, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "b0e0ee", 0x8, 0x0, 0x0, @private0, @mcast2, {[@routing={0x0, 0x0, 0x1}]}}}}}, 0x0) 14:39:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 14:39:41 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$IEEE802154_ASSOCIATE_REQ(r1, 0x0, 0x0) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) 14:39:41 executing program 7: syz_emit_ethernet(0x3e, &(0x7f0000000140)={@local, @dev, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "b0e0ee", 0x8, 0x0, 0x0, @private0, @mcast2, {[@routing={0x0, 0x0, 0x1}]}}}}}, 0x0) 14:39:41 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$IEEE802154_ASSOCIATE_REQ(r1, 0x0, 0x0) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) 14:39:41 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$IEEE802154_ASSOCIATE_REQ(r1, 0x0, 0x0) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) 14:39:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 14:39:41 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x371}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000c40)=""/134, 0x86}, {&(0x7f0000000b00)=""/118, 0x76}], 0x2) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) getpid() r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x40b01, 0x0) ioctl$CDROMREADMODE1(r2, 0x40081271, &(0x7f0000000080)={0x0, 0x4}) sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000b80)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="df000000000000000000c00cc0626f609eb43078ab7f00eb45587236a893d18babf16a146d180e0081c8dfb8ffe6a56daadeac1c24fa6ebf4757d559d6a008a567f595d882eb5a28"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff5e8, 0x8000, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x9}, 0x0, 0x4, 0x1, 0x7, 0x9, 0x4d, 0x4, 0x0, 0x5, 0x0, 0x5}, 0x0, 0xb, 0xffffffffffffffff, 0xb) r3 = getpgid(0x0) ptrace(0x8, r3) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000e372000008001a7074150b00"], 0x1c}}, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') 14:39:41 executing program 7: syz_emit_ethernet(0x3e, &(0x7f0000000140)={@local, @dev, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "b0e0ee", 0x8, 0x0, 0x0, @private0, @mcast2, {[@routing={0x0, 0x0, 0x1}]}}}}}, 0x0) 14:39:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 14:39:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 14:39:41 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 14:39:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 14:39:41 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$IEEE802154_ASSOCIATE_REQ(r1, 0x0, 0x0) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) 14:39:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 14:39:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 14:39:41 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 14:39:41 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 14:39:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x2, 0x0}, 0x7, 0x7800, 0x10001, 0x1}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @private, @local}, &(0x7f00000003c0)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0xfd}}, 0x14) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x5, 0x1, 0x3f, 0x0, 0x3ff, 0x50000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3b, 0x1, @perf_config_ext={0x1, 0x7fff}, 0xa8, 0x1, 0x20, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x4, 0x0, 0xdeb}, 0x0, 0x3, 0xffffffffffffffff, 0x3) 14:39:41 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0xfe, 0x40, 0x5, 0x32, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0x VM DIAGNOSIS: 14:39:36 Registers: info registers vcpu 0 RAX=000000000000000a RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff823bd531 RDI=ffffffff8765c9a0 RBP=ffffffff8765c960 RSP=ffff88803ff2f340 R8 =0000000000000001 R9 =0000000000000000 R10=0000000000000001 R11=0000000000000001 R12=000000000000000a R13=ffffffff8765c960 R14=0000000000000010 R15=ffffffff823bd520 RIP=ffffffff823bd589 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fc34d54b700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fc0d6150000 CR3=000000001b5fe000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007fc3500bc7c0 00007fc3500bc7c8 YMM02=0000000000000000 0000000000000000 00007fc3500bc7e0 00007fc3500bc7c0 YMM03=0000000000000000 0000000000000000 00007fc3500bc7c8 00007fc3500bc7c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=ffff88806ce3f080 RCX=0000000000000000 RDX=ffff88803e841ac0 RSI=ffffffff813bcaa7 RDI=0000000000000005 RBP=0000000000000000 RSP=ffff88801831f958 R8 =0000000000000005 R9 =0000000000000000 R10=0000000000000001 R11=0000000000000001 R12=0000000000000003 R13=ffffed100d9c7e11 R14=ffff88806ce3f088 R15=0000000000000001 RIP=ffffffff813bcaa9 RFL=00000293 [--S-A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0000 0000000000000000 00000000 00000000 DS =0000 0000000000000000 00000000 00000000 FS =0000 0000555555de0400 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fc3500e50a0 CR3=000000001b5fe000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007fc3500bc7c0 00007fc3500bc7c8 YMM02=0000000000000000 0000000000000000 00007fc3500bc7e0 00007fc3500bc7c0 YMM03=0000000000000000 0000000000000000 00007fc3500bc7c8 00007fc3500bc7c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000