Warning: Permanently added '[localhost]:44639' (ECDSA) to the list of known hosts. 2022/09/12 14:23:14 fuzzer started 2022/09/12 14:23:14 dialing manager at localhost:38027 syzkaller login: [ 36.416755] cgroup: Unknown subsys name 'net' [ 36.494630] cgroup: Unknown subsys name 'rlimit' 2022/09/12 14:23:29 syscalls: 2215 2022/09/12 14:23:29 code coverage: enabled 2022/09/12 14:23:29 comparison tracing: enabled 2022/09/12 14:23:29 extra coverage: enabled 2022/09/12 14:23:29 setuid sandbox: enabled 2022/09/12 14:23:29 namespace sandbox: enabled 2022/09/12 14:23:29 Android sandbox: enabled 2022/09/12 14:23:29 fault injection: enabled 2022/09/12 14:23:29 leak checking: enabled 2022/09/12 14:23:29 net packet injection: enabled 2022/09/12 14:23:29 net device setup: enabled 2022/09/12 14:23:29 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/12 14:23:29 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/12 14:23:29 USB emulation: enabled 2022/09/12 14:23:29 hci packet injection: enabled 2022/09/12 14:23:29 wifi device emulation: failed to parse kernel version (6.0.0-rc5-next-20220912) 2022/09/12 14:23:29 802.15.4 emulation: enabled 2022/09/12 14:23:29 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/12 14:23:29 fetching corpus: 50, signal 37568/40749 (executing program) 2022/09/12 14:23:29 fetching corpus: 100, signal 49076/53497 (executing program) 2022/09/12 14:23:29 fetching corpus: 150, signal 56297/61857 (executing program) 2022/09/12 14:23:29 fetching corpus: 200, signal 63073/69675 (executing program) 2022/09/12 14:23:29 fetching corpus: 250, signal 69293/76835 (executing program) 2022/09/12 14:23:30 fetching corpus: 300, signal 78101/86204 (executing program) 2022/09/12 14:23:30 fetching corpus: 350, signal 81610/90543 (executing program) 2022/09/12 14:23:30 fetching corpus: 400, signal 85463/95155 (executing program) 2022/09/12 14:23:30 fetching corpus: 450, signal 90082/100353 (executing program) 2022/09/12 14:23:30 fetching corpus: 500, signal 94778/105485 (executing program) 2022/09/12 14:23:30 fetching corpus: 550, signal 98996/110181 (executing program) 2022/09/12 14:23:31 fetching corpus: 600, signal 103256/114840 (executing program) 2022/09/12 14:23:31 fetching corpus: 650, signal 106967/118846 (executing program) 2022/09/12 14:23:31 fetching corpus: 700, signal 109755/122024 (executing program) 2022/09/12 14:23:31 fetching corpus: 750, signal 112059/124742 (executing program) 2022/09/12 14:23:31 fetching corpus: 800, signal 114453/127481 (executing program) 2022/09/12 14:23:32 fetching corpus: 850, signal 116399/129777 (executing program) 2022/09/12 14:23:32 fetching corpus: 900, signal 118617/132277 (executing program) 2022/09/12 14:23:32 fetching corpus: 950, signal 120698/134625 (executing program) 2022/09/12 14:23:32 fetching corpus: 1000, signal 122271/136521 (executing program) 2022/09/12 14:23:32 fetching corpus: 1050, signal 124633/139034 (executing program) 2022/09/12 14:23:32 fetching corpus: 1100, signal 126914/141458 (executing program) 2022/09/12 14:23:32 fetching corpus: 1150, signal 128602/143395 (executing program) 2022/09/12 14:23:33 fetching corpus: 1200, signal 129815/144902 (executing program) 2022/09/12 14:23:33 fetching corpus: 1250, signal 131613/146720 (executing program) 2022/09/12 14:23:33 fetching corpus: 1300, signal 134060/149089 (executing program) 2022/09/12 14:23:33 fetching corpus: 1350, signal 135236/150493 (executing program) 2022/09/12 14:23:33 fetching corpus: 1400, signal 136497/151898 (executing program) 2022/09/12 14:23:33 fetching corpus: 1450, signal 138153/153580 (executing program) 2022/09/12 14:23:33 fetching corpus: 1500, signal 140292/155509 (executing program) 2022/09/12 14:23:34 fetching corpus: 1550, signal 141785/157046 (executing program) 2022/09/12 14:23:34 fetching corpus: 1600, signal 143578/158686 (executing program) 2022/09/12 14:23:34 fetching corpus: 1650, signal 145257/160237 (executing program) 2022/09/12 14:23:34 fetching corpus: 1700, signal 146882/161736 (executing program) 2022/09/12 14:23:34 fetching corpus: 1750, signal 148314/163046 (executing program) 2022/09/12 14:23:34 fetching corpus: 1800, signal 149587/164235 (executing program) 2022/09/12 14:23:35 fetching corpus: 1850, signal 150732/165317 (executing program) 2022/09/12 14:23:35 fetching corpus: 1900, signal 152495/166787 (executing program) 2022/09/12 14:23:35 fetching corpus: 1950, signal 153565/167758 (executing program) 2022/09/12 14:23:35 fetching corpus: 2000, signal 154920/168945 (executing program) 2022/09/12 14:23:35 fetching corpus: 2050, signal 156860/170347 (executing program) 2022/09/12 14:23:35 fetching corpus: 2100, signal 157938/171247 (executing program) 2022/09/12 14:23:36 fetching corpus: 2150, signal 159485/172405 (executing program) 2022/09/12 14:23:36 fetching corpus: 2200, signal 160419/173206 (executing program) 2022/09/12 14:23:36 fetching corpus: 2250, signal 161726/174186 (executing program) 2022/09/12 14:23:36 fetching corpus: 2300, signal 162759/174935 (executing program) 2022/09/12 14:23:36 fetching corpus: 2350, signal 163640/175569 (executing program) 2022/09/12 14:23:36 fetching corpus: 2400, signal 164855/176448 (executing program) 2022/09/12 14:23:36 fetching corpus: 2450, signal 165822/177207 (executing program) 2022/09/12 14:23:37 fetching corpus: 2500, signal 166693/177840 (executing program) 2022/09/12 14:23:37 fetching corpus: 2550, signal 168485/178829 (executing program) 2022/09/12 14:23:37 fetching corpus: 2600, signal 169685/179525 (executing program) 2022/09/12 14:23:37 fetching corpus: 2650, signal 170702/180154 (executing program) 2022/09/12 14:23:37 fetching corpus: 2700, signal 171666/180774 (executing program) 2022/09/12 14:23:37 fetching corpus: 2750, signal 172485/181273 (executing program) 2022/09/12 14:23:38 fetching corpus: 2800, signal 173923/181987 (executing program) 2022/09/12 14:23:38 fetching corpus: 2850, signal 175086/182709 (executing program) 2022/09/12 14:23:38 fetching corpus: 2900, signal 176086/183267 (executing program) 2022/09/12 14:23:38 fetching corpus: 2950, signal 176787/183622 (executing program) 2022/09/12 14:23:38 fetching corpus: 3000, signal 177464/183960 (executing program) 2022/09/12 14:23:38 fetching corpus: 3050, signal 178360/184366 (executing program) 2022/09/12 14:23:38 fetching corpus: 3100, signal 179289/184747 (executing program) 2022/09/12 14:23:39 fetching corpus: 3141, signal 179959/185035 (executing program) 2022/09/12 14:23:39 fetching corpus: 3141, signal 179959/185130 (executing program) 2022/09/12 14:23:39 fetching corpus: 3141, signal 179959/185219 (executing program) 2022/09/12 14:23:39 fetching corpus: 3141, signal 179959/185304 (executing program) 2022/09/12 14:23:39 fetching corpus: 3141, signal 179959/185405 (executing program) 2022/09/12 14:23:39 fetching corpus: 3141, signal 179959/185486 (executing program) 2022/09/12 14:23:39 fetching corpus: 3141, signal 179959/185568 (executing program) 2022/09/12 14:23:39 fetching corpus: 3141, signal 179959/185648 (executing program) 2022/09/12 14:23:39 fetching corpus: 3141, signal 179959/185725 (executing program) 2022/09/12 14:23:39 fetching corpus: 3141, signal 179959/185808 (executing program) 2022/09/12 14:23:39 fetching corpus: 3141, signal 179959/185896 (executing program) 2022/09/12 14:23:39 fetching corpus: 3141, signal 179959/185981 (executing program) 2022/09/12 14:23:39 fetching corpus: 3141, signal 179959/186063 (executing program) 2022/09/12 14:23:39 fetching corpus: 3141, signal 179959/186150 (executing program) 2022/09/12 14:23:39 fetching corpus: 3141, signal 179959/186240 (executing program) 2022/09/12 14:23:39 fetching corpus: 3141, signal 179959/186332 (executing program) 2022/09/12 14:23:39 fetching corpus: 3141, signal 179959/186415 (executing program) 2022/09/12 14:23:39 fetching corpus: 3141, signal 179959/186491 (executing program) 2022/09/12 14:23:39 fetching corpus: 3141, signal 179959/186573 (executing program) 2022/09/12 14:23:39 fetching corpus: 3141, signal 179959/186659 (executing program) 2022/09/12 14:23:39 fetching corpus: 3141, signal 179959/186734 (executing program) 2022/09/12 14:23:39 fetching corpus: 3141, signal 179959/186817 (executing program) 2022/09/12 14:23:39 fetching corpus: 3141, signal 179959/186891 (executing program) 2022/09/12 14:23:39 fetching corpus: 3141, signal 179959/186969 (executing program) 2022/09/12 14:23:39 fetching corpus: 3141, signal 179959/187043 (executing program) 2022/09/12 14:23:39 fetching corpus: 3141, signal 179959/187123 (executing program) 2022/09/12 14:23:39 fetching corpus: 3141, signal 179959/187211 (executing program) 2022/09/12 14:23:39 fetching corpus: 3141, signal 179959/187290 (executing program) 2022/09/12 14:23:39 fetching corpus: 3141, signal 179959/187301 (executing program) 2022/09/12 14:23:39 fetching corpus: 3141, signal 179959/187301 (executing program) 2022/09/12 14:23:41 starting 8 fuzzer processes 14:23:41 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x53) sendmmsg(r0, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000300)="e9", 0x1}], 0x1}}], 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000200)="b33ee22ad8c71c23bf0f9698bb966f39d5f180a1c1f27d731283d77c972c6baa894c4def51d56f80875cec083384bf7c5c1d9917b87f2b67a46557ac3cd8e2b3318ea70769b3041782d0cae779b71b1f7e81e768475b8aeb8e09b4ab", 0xfffffe02, 0x4000805, 0x0, 0x0) 14:23:41 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000000c0)=0x4, 0x4) sendmsg$inet(r0, &(0x7f0000000ac0)={&(0x7f0000000380)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000000)="fee1", 0xffec}], 0x1}, 0x0) 14:23:41 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f00000000c0), 0x12) io_setup(0x9, &(0x7f0000000140)=0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r1, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f00000001c0)=')', 0x1}]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r3, &(0x7f0000002980)=[{{&(0x7f0000000140)={0x2, 0x4e23, @remote}, 0x10, 0x0}}, {{&(0x7f0000001540)={0x2, 0x4e21, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000002900)=[@ip_pktinfo={{0x1c, 0x11, 0x8, {0x0, @private, @private}}}], 0x20}}], 0x2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r4, &(0x7f0000000000), 0xfffffdef) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) 14:23:41 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000002840)='ns/mnt\x00') 14:23:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x21) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="440a2dfab6ee34d3d2a0"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') pwritev(r0, &(0x7f00000000c0)=[{0x0}, {&(0x7f0000000000)="dbf225f5a4568675d4b9d93506777ce8e7e1", 0x12}, {&(0x7f0000000240)}], 0x3, 0x8001, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) r3 = syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x254, 0x0, r0}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r2, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) r5 = memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) syz_io_uring_setup(0x7d8d, &(0x7f00000007c0)={0x0, 0xb5f1, 0x20, 0x3, 0x1b5}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000840), &(0x7f0000000880)) fallocate(r5, 0x8, 0x0, 0x8800000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r5, @ANYBLOB="315ec9"]) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x6, r3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x100000) [ 63.495248] audit: type=1400 audit(1662992621.790:6): avc: denied { execmem } for pid=283 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 14:23:41 executing program 5: ioctl$CDROMREADMODE1(0xffffffffffffffff, 0x530d, &(0x7f0000000800)={0x6, 0x0, 0x20, 0x81, 0x6, 0x89}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000680)=ANY=[@ANYBLOB="010000000100000018000000225442cc886f73f6887bcf48390d12015b880885d5655ead1a392fdf939a126787adfb5297df8a9a4164ca7e0aca0fedb036fc229c1bd65a37085a96e0f03780627ee5db16445f12dc4d2214fcf5cfc8f4600d709398fb4d2f907a0ffeff2d410de4c932cb354f144f35766984e8fca641b832810d7bdf2d8859d50012d0e4794044524e7bfa2c23238aab3c5e161e", @ANYRES32, @ANYBLOB="00000001000000002e2f66696c65300031da2e259aee02a995f812295f94589f4f5d413194238a7156777bd79708cb11ab94fd548ddfec2201000000e0440700000000000000c1d6f4e0eb39a7b53c244a1bc59f22ff0d447b62ab39f5a19ef23c3f798cda7ae9000000000000000000000000070000000ceb50c903636a0afedcf79817fee270005bf8df20e26d4bd81c2218916d8d238ef8f6d76dc6fee4bc5da51042e853cf2e72736b3baa2780795b804eecbf32d5a98696e301ab97f82c240c8bbc322aa90dd38a289661a87540e0"]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) r1 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000180)={'security\x00', 0x0, [0xfffffff8, 0xa22, 0x0, 0x1, 0x2]}, &(0x7f0000000200)=0x54) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r2, &(0x7f0000000140)={r1, 0xffffffffffffffff, 0x3d}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = pidfd_open(0x0, 0x0) dup(r3) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 14:23:41 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) listxattr(&(0x7f0000000000)='./cgroup/cgroup.procs\x00', 0x0, 0x0) 14:23:41 executing program 7: clone3(&(0x7f00000001c0)={0x0, &(0x7f0000000180)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) waitid$P_PIDFD(0x2, r0, 0x0, 0x80000009, 0x0) [ 64.673342] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 64.675879] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 64.677282] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 64.681803] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 64.683637] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 64.685302] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 64.690494] Bluetooth: hci0: HCI_REQ-0x0c1a [ 64.727228] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 64.734655] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 64.736273] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 64.737486] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 64.738799] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 64.739893] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 64.741100] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 64.742943] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 64.745986] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 64.747765] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 64.754799] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 64.759026] Bluetooth: hci1: HCI_REQ-0x0c1a [ 64.760143] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 64.772315] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 64.799935] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 64.809725] Bluetooth: hci3: HCI_REQ-0x0c1a [ 64.809781] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 64.826643] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 64.829051] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 64.830696] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 64.834932] Bluetooth: hci2: HCI_REQ-0x0c1a [ 64.851164] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 64.854432] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 64.856367] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 64.863082] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 64.866883] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 64.869362] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 64.877943] Bluetooth: hci6: HCI_REQ-0x0c1a [ 64.908987] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 64.911389] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 64.914089] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 64.922875] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 64.925426] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 64.927611] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 64.929901] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 64.937851] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 64.940554] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 64.988686] Bluetooth: hci4: HCI_REQ-0x0c1a [ 65.015791] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 65.018330] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 65.033445] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 65.041229] Bluetooth: hci7: HCI_REQ-0x0c1a [ 66.763224] Bluetooth: hci0: command 0x0409 tx timeout [ 66.826696] Bluetooth: hci5: Opcode 0x c03 failed: -110 [ 66.828187] Bluetooth: hci1: command 0x0409 tx timeout [ 66.890563] Bluetooth: hci2: command 0x0409 tx timeout [ 66.891144] Bluetooth: hci3: command 0x0409 tx timeout [ 66.954638] Bluetooth: hci6: command 0x0409 tx timeout [ 67.019560] Bluetooth: hci4: command 0x0409 tx timeout [ 67.083560] Bluetooth: hci7: command 0x0409 tx timeout [ 68.811659] Bluetooth: hci0: command 0x041b tx timeout [ 68.874607] Bluetooth: hci1: command 0x041b tx timeout [ 68.938622] Bluetooth: hci3: command 0x041b tx timeout [ 68.939627] Bluetooth: hci2: command 0x041b tx timeout [ 69.002617] Bluetooth: hci6: command 0x041b tx timeout [ 69.066818] Bluetooth: hci4: command 0x041b tx timeout [ 69.130613] Bluetooth: hci7: command 0x041b tx timeout [ 70.858596] Bluetooth: hci0: command 0x040f tx timeout [ 70.922747] Bluetooth: hci1: command 0x040f tx timeout [ 70.986736] Bluetooth: hci2: command 0x040f tx timeout [ 70.987898] Bluetooth: hci3: command 0x040f tx timeout [ 71.050661] Bluetooth: hci6: command 0x040f tx timeout [ 71.114599] Bluetooth: hci4: command 0x040f tx timeout [ 71.178614] Bluetooth: hci7: command 0x040f tx timeout [ 72.138708] Bluetooth: hci5: Opcode 0x c03 failed: -110 [ 72.906572] Bluetooth: hci0: command 0x0419 tx timeout [ 72.970566] Bluetooth: hci1: command 0x0419 tx timeout [ 73.035645] Bluetooth: hci3: command 0x0419 tx timeout [ 73.036220] Bluetooth: hci2: command 0x0419 tx timeout [ 73.099617] Bluetooth: hci6: command 0x0419 tx timeout [ 73.162581] Bluetooth: hci4: command 0x0419 tx timeout [ 73.226581] Bluetooth: hci7: command 0x0419 tx timeout [ 76.683599] Bluetooth: hci5: Opcode 0x c03 failed: -110 [ 79.248062] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 79.249444] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 79.250393] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 79.252136] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 79.313082] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 79.327768] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 79.349611] Bluetooth: hci5: HCI_REQ-0x0c1a [ 81.419606] Bluetooth: hci5: command 0x0409 tx timeout [ 83.466599] Bluetooth: hci5: command 0x041b tx timeout [ 85.514732] Bluetooth: hci5: command 0x040f tx timeout [ 87.563174] Bluetooth: hci5: command 0x0419 tx timeout 14:24:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r0, 0x400, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) [ 119.542699] audit: type=1326 audit(1662992677.838:7): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=3694 comm="syz-executor.3" exe="/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe64183cb19 code=0x0 [ 119.645191] audit: type=1400 audit(1662992677.940:8): avc: denied { open } for pid=3694 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 119.646623] audit: type=1400 audit(1662992677.941:9): avc: denied { kernel } for pid=3694 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 119.650548] ------------[ cut here ]------------ [ 119.650568] [ 119.650571] ====================================================== [ 119.650574] WARNING: possible circular locking dependency detected [ 119.650578] 6.0.0-rc5-next-20220912 #1 Not tainted [ 119.650585] ------------------------------------------------------ [ 119.650588] syz-executor.3/3702 is trying to acquire lock: [ 119.650594] ffffffff853fa878 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 119.650633] [ 119.650633] but task is already holding lock: [ 119.650636] ffff888019e97820 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 119.650663] [ 119.650663] which lock already depends on the new lock. [ 119.650663] [ 119.650667] [ 119.650667] the existing dependency chain (in reverse order) is: [ 119.650670] [ 119.650670] -> #3 (&ctx->lock){....}-{2:2}: [ 119.650684] _raw_spin_lock+0x2a/0x40 [ 119.650700] __perf_event_task_sched_out+0x53b/0x18d0 [ 119.650713] __schedule+0xedd/0x2470 [ 119.650722] schedule+0xda/0x1b0 [ 119.650731] exit_to_user_mode_prepare+0x114/0x1a0 [ 119.650753] syscall_exit_to_user_mode+0x19/0x40 [ 119.650770] do_syscall_64+0x48/0x90 [ 119.650784] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 119.650801] [ 119.650801] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 119.650815] _raw_spin_lock_nested+0x30/0x40 [ 119.650829] raw_spin_rq_lock_nested+0x1e/0x30 [ 119.650843] task_fork_fair+0x63/0x4d0 [ 119.650860] sched_cgroup_fork+0x3d0/0x540 [ 119.650874] copy_process+0x3f9e/0x6df0 [ 119.650885] kernel_clone+0xe7/0x890 [ 119.650894] user_mode_thread+0xad/0xf0 [ 119.650904] rest_init+0x24/0x250 [ 119.650920] arch_call_rest_init+0xf/0x14 [ 119.650940] start_kernel+0x4c1/0x4e6 [ 119.650956] secondary_startup_64_no_verify+0xe0/0xeb [ 119.650971] [ 119.650971] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 119.650985] _raw_spin_lock_irqsave+0x39/0x60 [ 119.650999] try_to_wake_up+0xab/0x1920 [ 119.651012] up+0x75/0xb0 [ 119.651024] __up_console_sem+0x6e/0x80 [ 119.651040] console_unlock+0x46a/0x590 [ 119.651057] vprintk_emit+0x1bd/0x560 [ 119.651073] vprintk+0x84/0xa0 [ 119.651090] _printk+0xba/0xf1 [ 119.651108] kauditd_hold_skb.cold+0x3f/0x4e [ 119.651122] kauditd_send_queue+0x233/0x290 [ 119.651136] kauditd_thread+0x5da/0x9a0 [ 119.651150] kthread+0x2ed/0x3a0 [ 119.651165] ret_from_fork+0x22/0x30 [ 119.651177] [ 119.651177] -> #0 ((console_sem).lock){....}-{2:2}: [ 119.651191] __lock_acquire+0x2a02/0x5e70 [ 119.651208] lock_acquire+0x1a2/0x530 [ 119.651224] _raw_spin_lock_irqsave+0x39/0x60 [ 119.651239] down_trylock+0xe/0x70 [ 119.651251] __down_trylock_console_sem+0x3b/0xd0 [ 119.651267] vprintk_emit+0x16b/0x560 [ 119.651284] vprintk+0x84/0xa0 [ 119.651300] _printk+0xba/0xf1 [ 119.651318] report_bug.cold+0x72/0xab [ 119.651331] handle_bug+0x3c/0x70 [ 119.651344] exc_invalid_op+0x14/0x50 [ 119.651356] asm_exc_invalid_op+0x16/0x20 [ 119.651373] group_sched_out.part.0+0x2c7/0x460 [ 119.651383] ctx_sched_out+0x8f1/0xc10 [ 119.651393] __perf_event_task_sched_out+0x6d0/0x18d0 [ 119.651405] __schedule+0xedd/0x2470 [ 119.651414] schedule+0xda/0x1b0 [ 119.651423] exit_to_user_mode_prepare+0x114/0x1a0 [ 119.651442] syscall_exit_to_user_mode+0x19/0x40 [ 119.651459] do_syscall_64+0x48/0x90 [ 119.651472] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 119.651488] [ 119.651488] other info that might help us debug this: [ 119.651488] [ 119.651491] Chain exists of: [ 119.651491] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 119.651491] [ 119.651506] Possible unsafe locking scenario: [ 119.651506] [ 119.651509] CPU0 CPU1 [ 119.651511] ---- ---- [ 119.651514] lock(&ctx->lock); [ 119.651520] lock(&rq->__lock); [ 119.651526] lock(&ctx->lock); [ 119.651532] lock((console_sem).lock); [ 119.651538] [ 119.651538] *** DEADLOCK *** [ 119.651538] [ 119.651540] 2 locks held by syz-executor.3/3702: [ 119.651547] #0: ffff88806ce37cd8 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 119.651572] #1: ffff888019e97820 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 119.651600] [ 119.651600] stack backtrace: [ 119.651603] CPU: 0 PID: 3702 Comm: syz-executor.3 Not tainted 6.0.0-rc5-next-20220912 #1 [ 119.651615] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 119.651624] Call Trace: [ 119.651627] [ 119.651631] dump_stack_lvl+0x8b/0xb3 [ 119.651645] check_noncircular+0x263/0x2e0 [ 119.651662] ? format_decode+0x26c/0xb50 [ 119.651677] ? print_circular_bug+0x450/0x450 [ 119.651695] ? enable_ptr_key_workfn+0x20/0x20 [ 119.651708] ? __lockdep_reset_lock+0x180/0x180 [ 119.651725] ? format_decode+0x26c/0xb50 [ 119.651740] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 119.651758] __lock_acquire+0x2a02/0x5e70 [ 119.651780] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 119.651803] lock_acquire+0x1a2/0x530 [ 119.651821] ? down_trylock+0xe/0x70 [ 119.651835] ? rcu_read_unlock+0x40/0x40 [ 119.651853] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 119.651874] ? vprintk+0x84/0xa0 [ 119.651893] _raw_spin_lock_irqsave+0x39/0x60 [ 119.651908] ? down_trylock+0xe/0x70 [ 119.651922] down_trylock+0xe/0x70 [ 119.651935] ? vprintk+0x84/0xa0 [ 119.651952] __down_trylock_console_sem+0x3b/0xd0 [ 119.651970] vprintk_emit+0x16b/0x560 [ 119.651987] ? lock_downgrade+0x6d0/0x6d0 [ 119.652006] vprintk+0x84/0xa0 [ 119.652024] _printk+0xba/0xf1 [ 119.652042] ? record_print_text.cold+0x16/0x16 [ 119.652062] ? hrtimer_try_to_cancel+0x163/0x2c0 [ 119.652076] ? lock_downgrade+0x6d0/0x6d0 [ 119.652094] ? report_bug.cold+0x66/0xab [ 119.652108] ? group_sched_out.part.0+0x2c7/0x460 [ 119.652119] report_bug.cold+0x72/0xab [ 119.652134] handle_bug+0x3c/0x70 [ 119.652148] exc_invalid_op+0x14/0x50 [ 119.652162] asm_exc_invalid_op+0x16/0x20 [ 119.652179] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 119.652193] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 119.652204] RSP: 0018:ffff88804031fc48 EFLAGS: 00010006 [ 119.652214] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 119.652221] RDX: ffff888015cd3580 RSI: ffffffff81566027 RDI: 0000000000000005 [ 119.652229] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 119.652236] R10: 0000000000000000 R11: 0000000000000001 R12: ffff888019e97800 [ 119.652244] R13: ffff88806ce3d100 R14: ffffffff8547bfc0 R15: 0000000000000002 [ 119.652255] ? group_sched_out.part.0+0x2c7/0x460 [ 119.652268] ? group_sched_out.part.0+0x2c7/0x460 [ 119.652281] ctx_sched_out+0x8f1/0xc10 [ 119.652293] __perf_event_task_sched_out+0x6d0/0x18d0 [ 119.652309] ? lock_is_held_type+0xd7/0x130 [ 119.652327] ? __perf_cgroup_move+0x160/0x160 [ 119.652339] ? set_next_entity+0x304/0x550 [ 119.652357] ? update_curr+0x267/0x740 [ 119.652385] ? lock_is_held_type+0xd7/0x130 [ 119.652402] __schedule+0xedd/0x2470 [ 119.652415] ? io_schedule_timeout+0x150/0x150 [ 119.652428] ? __x64_sys_futex_time32+0x480/0x480 [ 119.652442] schedule+0xda/0x1b0 [ 119.652453] exit_to_user_mode_prepare+0x114/0x1a0 [ 119.652473] syscall_exit_to_user_mode+0x19/0x40 [ 119.652490] do_syscall_64+0x48/0x90 [ 119.652503] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 119.652520] RIP: 0033:0x7fe64183cb19 [ 119.652528] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 119.652540] RSP: 002b:00007fe63ed91218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 119.652551] RAX: 0000000000000001 RBX: 00007fe641950028 RCX: 00007fe64183cb19 [ 119.652559] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fe64195002c [ 119.652568] RBP: 00007fe641950020 R08: 000000000000000e R09: 0000000000000000 [ 119.652576] R10: 0000000000000004 R11: 0000000000000246 R12: 00007fe64195002c [ 119.652584] R13: 00007ffd1eb2882f R14: 00007fe63ed91300 R15: 0000000000022000 [ 119.652597] [ 119.709607] WARNING: CPU: 0 PID: 3702 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 119.710252] Modules linked in: [ 119.710479] CPU: 0 PID: 3702 Comm: syz-executor.3 Not tainted 6.0.0-rc5-next-20220912 #1 [ 119.711046] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 119.711890] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 119.712298] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 119.713533] RSP: 0018:ffff88804031fc48 EFLAGS: 00010006 [ 119.713918] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 119.714466] RDX: ffff888015cd3580 RSI: ffffffff81566027 RDI: 0000000000000005 [ 119.715017] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 119.715497] R10: 0000000000000000 R11: 0000000000000001 R12: ffff888019e97800 [ 119.715981] R13: ffff88806ce3d100 R14: ffffffff8547bfc0 R15: 0000000000000002 [ 119.716483] FS: 00007fe63ed91700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 119.717042] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 119.717476] CR2: 00007f72641a89f0 CR3: 000000003fd08000 CR4: 0000000000350ef0 [ 119.718021] Call Trace: [ 119.718218] [ 119.718395] ctx_sched_out+0x8f1/0xc10 [ 119.718697] __perf_event_task_sched_out+0x6d0/0x18d0 [ 119.719075] ? lock_is_held_type+0xd7/0x130 [ 119.719390] ? __perf_cgroup_move+0x160/0x160 [ 119.719700] ? set_next_entity+0x304/0x550 [ 119.720002] ? update_curr+0x267/0x740 [ 119.720289] ? lock_is_held_type+0xd7/0x130 [ 119.720606] __schedule+0xedd/0x2470 [ 119.720866] ? io_schedule_timeout+0x150/0x150 [ 119.721186] ? __x64_sys_futex_time32+0x480/0x480 [ 119.721528] schedule+0xda/0x1b0 [ 119.721772] exit_to_user_mode_prepare+0x114/0x1a0 [ 119.722122] syscall_exit_to_user_mode+0x19/0x40 [ 119.722460] do_syscall_64+0x48/0x90 [ 119.722723] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 119.723084] RIP: 0033:0x7fe64183cb19 [ 119.723341] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 119.724585] RSP: 002b:00007fe63ed91218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 119.725165] RAX: 0000000000000001 RBX: 00007fe641950028 RCX: 00007fe64183cb19 [ 119.725722] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fe64195002c [ 119.726264] RBP: 00007fe641950020 R08: 000000000000000e R09: 0000000000000000 [ 119.726802] R10: 0000000000000004 R11: 0000000000000246 R12: 00007fe64195002c [ 119.727335] R13: 00007ffd1eb2882f R14: 00007fe63ed91300 R15: 0000000000022000 [ 119.727882] [ 119.728060] irq event stamp: 470 [ 119.728318] hardirqs last enabled at (469): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 119.729008] hardirqs last disabled at (470): [] __schedule+0x1225/0x2470 [ 119.729573] softirqs last enabled at (190): [] __irq_exit_rcu+0x11b/0x180 [ 119.730148] softirqs last disabled at (157): [] __irq_exit_rcu+0x11b/0x180 [ 119.730725] ---[ end trace 0000000000000000 ]--- [ 120.381325] audit: type=1326 audit(1662992678.677:10): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=3694 comm="syz-executor.3" exe="/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe64183cb19 code=0x0 [ 121.386829] IPv4: Oversized IP packet from 127.0.0.1 [ 121.399645] IPv4: Oversized IP packet from 127.0.0.1 [ 121.524072] syz-executor.4 (3857) used greatest stack depth: 24352 bytes left [ 124.704531] hrtimer: interrupt took 18765 ns [ 124.742232] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s [ 124.744330] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 124.745775] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 124.746710] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 08 00 [ 124.747780] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 4 prio class 2 [ 124.749482] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 124.750210] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 124.751349] Buffer I/O error on dev sr0, logical block 0, async page read [ 124.752761] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 124.753471] I/O error, dev sr0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 124.754678] Buffer I/O error on dev sr0, logical block 1, async page read [ 124.756054] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 124.756836] I/O error, dev sr0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 124.757890] Buffer I/O error on dev sr0, logical block 2, async page read [ 124.758835] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 124.759335] I/O error, dev sr0, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 124.760157] Buffer I/O error on dev sr0, logical block 3, async page read [ 124.761060] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 124.761431] I/O error, dev sr0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 124.762037] Buffer I/O error on dev sr0, logical block 4, async page read [ 124.762771] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 124.763132] I/O error, dev sr0, sector 5 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 124.763715] Buffer I/O error on dev sr0, logical block 5, async page read [ 124.764413] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 124.764855] I/O error, dev sr0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 124.765395] Buffer I/O error on dev sr0, logical block 6, async page read [ 124.766158] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 124.766551] I/O error, dev sr0, sector 7 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 124.767100] Buffer I/O error on dev sr0, logical block 7, async page read [ 125.022112] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s [ 125.023347] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 125.024239] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 125.025119] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 08 00 [ 125.026101] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 3 prio class 2 14:24:43 executing program 5: ioctl$CDROMREADMODE1(0xffffffffffffffff, 0x530d, &(0x7f0000000800)={0x6, 0x0, 0x20, 0x81, 0x6, 0x89}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000680)=ANY=[@ANYBLOB="010000000100000018000000225442cc886f73f6887bcf48390d12015b880885d5655ead1a392fdf939a126787adfb5297df8a9a4164ca7e0aca0fedb036fc229c1bd65a37085a96e0f03780627ee5db16445f12dc4d2214fcf5cfc8f4600d709398fb4d2f907a0ffeff2d410de4c932cb354f144f35766984e8fca641b832810d7bdf2d8859d50012d0e4794044524e7bfa2c23238aab3c5e161e", @ANYRES32, @ANYBLOB="00000001000000002e2f66696c65300031da2e259aee02a995f812295f94589f4f5d413194238a7156777bd79708cb11ab94fd548ddfec2201000000e0440700000000000000c1d6f4e0eb39a7b53c244a1bc59f22ff0d447b62ab39f5a19ef23c3f798cda7ae9000000000000000000000000070000000ceb50c903636a0afedcf79817fee270005bf8df20e26d4bd81c2218916d8d238ef8f6d76dc6fee4bc5da51042e853cf2e72736b3baa2780795b804eecbf32d5a98696e301ab97f82c240c8bbc322aa90dd38a289661a87540e0"]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) r1 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000180)={'security\x00', 0x0, [0xfffffff8, 0xa22, 0x0, 0x1, 0x2]}, &(0x7f0000000200)=0x54) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r2, &(0x7f0000000140)={r1, 0xffffffffffffffff, 0x3d}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = pidfd_open(0x0, 0x0) dup(r3) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 14:24:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r0, 0x400, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) 14:24:43 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) listxattr(&(0x7f0000000000)='./cgroup/cgroup.procs\x00', 0x0, 0x0) 14:24:43 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x53) sendmmsg(r0, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000300)="e9", 0x1}], 0x1}}], 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000200)="b33ee22ad8c71c23bf0f9698bb966f39d5f180a1c1f27d731283d77c972c6baa894c4def51d56f80875cec083384bf7c5c1d9917b87f2b67a46557ac3cd8e2b3318ea70769b3041782d0cae779b71b1f7e81e768475b8aeb8e09b4ab", 0xfffffe02, 0x4000805, 0x0, 0x0) 14:24:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x21) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="440a2dfab6ee34d3d2a0"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') pwritev(r0, &(0x7f00000000c0)=[{0x0}, {&(0x7f0000000000)="dbf225f5a4568675d4b9d93506777ce8e7e1", 0x12}, {&(0x7f0000000240)}], 0x3, 0x8001, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) r3 = syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x254, 0x0, r0}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r2, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) r5 = memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) syz_io_uring_setup(0x7d8d, &(0x7f00000007c0)={0x0, 0xb5f1, 0x20, 0x3, 0x1b5}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000840), &(0x7f0000000880)) fallocate(r5, 0x8, 0x0, 0x8800000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r5, @ANYBLOB="315ec9"]) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x6, r3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x100000) 14:24:43 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000000c0)=0x4, 0x4) sendmsg$inet(r0, &(0x7f0000000ac0)={&(0x7f0000000380)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000000)="fee1", 0xffec}], 0x1}, 0x0) 14:24:43 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f00000000c0), 0x12) io_setup(0x9, &(0x7f0000000140)=0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r1, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f00000001c0)=')', 0x1}]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r3, &(0x7f0000002980)=[{{&(0x7f0000000140)={0x2, 0x4e23, @remote}, 0x10, 0x0}}, {{&(0x7f0000001540)={0x2, 0x4e21, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000002900)=[@ip_pktinfo={{0x1c, 0x11, 0x8, {0x0, @private, @private}}}], 0x20}}], 0x2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r4, &(0x7f0000000000), 0xfffffdef) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) 14:24:43 executing program 7: clone3(&(0x7f00000001c0)={0x0, &(0x7f0000000180)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) waitid$P_PIDFD(0x2, r0, 0x0, 0x80000009, 0x0) [ 125.143890] IPv4: Oversized IP packet from 127.0.0.1 [ 125.148245] audit: type=1326 audit(1662992683.444:11): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=3970 comm="syz-executor.3" exe="/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe64183cb19 code=0x0 14:24:43 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) listxattr(&(0x7f0000000000)='./cgroup/cgroup.procs\x00', 0x0, 0x0) 14:24:43 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000000c0)=0x4, 0x4) sendmsg$inet(r0, &(0x7f0000000ac0)={&(0x7f0000000380)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000000)="fee1", 0xffec}], 0x1}, 0x0) [ 125.341674] IPv4: Oversized IP packet from 127.0.0.1 14:24:44 executing program 7: clone3(&(0x7f00000001c0)={0x0, &(0x7f0000000180)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) waitid$P_PIDFD(0x2, r0, 0x0, 0x80000009, 0x0) 14:24:44 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000000c0)=0x4, 0x4) sendmsg$inet(r0, &(0x7f0000000ac0)={&(0x7f0000000380)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000000)="fee1", 0xffec}], 0x1}, 0x0) 14:24:44 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) listxattr(&(0x7f0000000000)='./cgroup/cgroup.procs\x00', 0x0, 0x0) 14:24:44 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f00000000c0), 0x12) io_setup(0x9, &(0x7f0000000140)=0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r1, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f00000001c0)=')', 0x1}]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r3, &(0x7f0000002980)=[{{&(0x7f0000000140)={0x2, 0x4e23, @remote}, 0x10, 0x0}}, {{&(0x7f0000001540)={0x2, 0x4e21, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000002900)=[@ip_pktinfo={{0x1c, 0x11, 0x8, {0x0, @private, @private}}}], 0x20}}], 0x2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r4, &(0x7f0000000000), 0xfffffdef) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) 14:24:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r0, 0x400, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) 14:24:44 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x53) sendmmsg(r0, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000300)="e9", 0x1}], 0x1}}], 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000200)="b33ee22ad8c71c23bf0f9698bb966f39d5f180a1c1f27d731283d77c972c6baa894c4def51d56f80875cec083384bf7c5c1d9917b87f2b67a46557ac3cd8e2b3318ea70769b3041782d0cae779b71b1f7e81e768475b8aeb8e09b4ab", 0xfffffe02, 0x4000805, 0x0, 0x0) 14:24:44 executing program 5: ioctl$CDROMREADMODE1(0xffffffffffffffff, 0x530d, &(0x7f0000000800)={0x6, 0x0, 0x20, 0x81, 0x6, 0x89}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000680)=ANY=[@ANYBLOB="010000000100000018000000225442cc886f73f6887bcf48390d12015b880885d5655ead1a392fdf939a126787adfb5297df8a9a4164ca7e0aca0fedb036fc229c1bd65a37085a96e0f03780627ee5db16445f12dc4d2214fcf5cfc8f4600d709398fb4d2f907a0ffeff2d410de4c932cb354f144f35766984e8fca641b832810d7bdf2d8859d50012d0e4794044524e7bfa2c23238aab3c5e161e", @ANYRES32, @ANYBLOB="00000001000000002e2f66696c65300031da2e259aee02a995f812295f94589f4f5d413194238a7156777bd79708cb11ab94fd548ddfec2201000000e0440700000000000000c1d6f4e0eb39a7b53c244a1bc59f22ff0d447b62ab39f5a19ef23c3f798cda7ae9000000000000000000000000070000000ceb50c903636a0afedcf79817fee270005bf8df20e26d4bd81c2218916d8d238ef8f6d76dc6fee4bc5da51042e853cf2e72736b3baa2780795b804eecbf32d5a98696e301ab97f82c240c8bbc322aa90dd38a289661a87540e0"]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) r1 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000180)={'security\x00', 0x0, [0xfffffff8, 0xa22, 0x0, 0x1, 0x2]}, &(0x7f0000000200)=0x54) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r2, &(0x7f0000000140)={r1, 0xffffffffffffffff, 0x3d}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = pidfd_open(0x0, 0x0) dup(r3) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 14:24:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x21) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="440a2dfab6ee34d3d2a0"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') pwritev(r0, &(0x7f00000000c0)=[{0x0}, {&(0x7f0000000000)="dbf225f5a4568675d4b9d93506777ce8e7e1", 0x12}, {&(0x7f0000000240)}], 0x3, 0x8001, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) r3 = syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x254, 0x0, r0}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r2, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) r5 = memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) syz_io_uring_setup(0x7d8d, &(0x7f00000007c0)={0x0, 0xb5f1, 0x20, 0x3, 0x1b5}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000840), &(0x7f0000000880)) fallocate(r5, 0x8, 0x0, 0x8800000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r5, @ANYBLOB="315ec9"]) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x6, r3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x100000) [ 126.377936] audit: type=1326 audit(1662992684.665:12): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4002 comm="syz-executor.3" exe="/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe64183cb19 code=0x0 [ 126.390501] IPv4: Oversized IP packet from 127.0.0.1 14:24:44 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x53) sendmmsg(r0, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000300)="e9", 0x1}], 0x1}}], 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000200)="b33ee22ad8c71c23bf0f9698bb966f39d5f180a1c1f27d731283d77c972c6baa894c4def51d56f80875cec083384bf7c5c1d9917b87f2b67a46557ac3cd8e2b3318ea70769b3041782d0cae779b71b1f7e81e768475b8aeb8e09b4ab", 0xfffffe02, 0x4000805, 0x0, 0x0) 14:24:44 executing program 7: clone3(&(0x7f00000001c0)={0x0, &(0x7f0000000180)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) waitid$P_PIDFD(0x2, r0, 0x0, 0x80000009, 0x0) [ 126.534404] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s [ 126.535572] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 126.536313] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 126.537083] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 08 00 [ 126.540719] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 126.541351] Buffer I/O error on dev sr0, logical block 0, async page read [ 126.543427] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 126.544105] Buffer I/O error on dev sr0, logical block 1, async page read [ 126.545070] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 126.546149] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 126.546902] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 126.547707] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 126.548568] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 126.549377] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 14:24:44 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x53) sendmmsg(r0, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000300)="e9", 0x1}], 0x1}}], 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000200)="b33ee22ad8c71c23bf0f9698bb966f39d5f180a1c1f27d731283d77c972c6baa894c4def51d56f80875cec083384bf7c5c1d9917b87f2b67a46557ac3cd8e2b3318ea70769b3041782d0cae779b71b1f7e81e768475b8aeb8e09b4ab", 0xfffffe02, 0x4000805, 0x0, 0x0) 14:24:45 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f00000000c0), 0x12) io_setup(0x9, &(0x7f0000000140)=0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r1, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f00000001c0)=')', 0x1}]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r3, &(0x7f0000002980)=[{{&(0x7f0000000140)={0x2, 0x4e23, @remote}, 0x10, 0x0}}, {{&(0x7f0000001540)={0x2, 0x4e21, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000002900)=[@ip_pktinfo={{0x1c, 0x11, 0x8, {0x0, @private, @private}}}], 0x20}}], 0x2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r4, &(0x7f0000000000), 0xfffffdef) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) 14:24:45 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f00000000c0), 0x12) io_setup(0x9, &(0x7f0000000140)=0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r1, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f00000001c0)=')', 0x1}]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r3, &(0x7f0000002980)=[{{&(0x7f0000000140)={0x2, 0x4e23, @remote}, 0x10, 0x0}}, {{&(0x7f0000001540)={0x2, 0x4e21, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000002900)=[@ip_pktinfo={{0x1c, 0x11, 0x8, {0x0, @private, @private}}}], 0x20}}], 0x2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r4, &(0x7f0000000000), 0xfffffdef) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) 14:24:45 executing program 5: ioctl$CDROMREADMODE1(0xffffffffffffffff, 0x530d, &(0x7f0000000800)={0x6, 0x0, 0x20, 0x81, 0x6, 0x89}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000680)=ANY=[@ANYBLOB="010000000100000018000000225442cc886f73f6887bcf48390d12015b880885d5655ead1a392fdf939a126787adfb5297df8a9a4164ca7e0aca0fedb036fc229c1bd65a37085a96e0f03780627ee5db16445f12dc4d2214fcf5cfc8f4600d709398fb4d2f907a0ffeff2d410de4c932cb354f144f35766984e8fca641b832810d7bdf2d8859d50012d0e4794044524e7bfa2c23238aab3c5e161e", @ANYRES32, @ANYBLOB="00000001000000002e2f66696c65300031da2e259aee02a995f812295f94589f4f5d413194238a7156777bd79708cb11ab94fd548ddfec2201000000e0440700000000000000c1d6f4e0eb39a7b53c244a1bc59f22ff0d447b62ab39f5a19ef23c3f798cda7ae9000000000000000000000000070000000ceb50c903636a0afedcf79817fee270005bf8df20e26d4bd81c2218916d8d238ef8f6d76dc6fee4bc5da51042e853cf2e72736b3baa2780795b804eecbf32d5a98696e301ab97f82c240c8bbc322aa90dd38a289661a87540e0"]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) r1 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000180)={'security\x00', 0x0, [0xfffffff8, 0xa22, 0x0, 0x1, 0x2]}, &(0x7f0000000200)=0x54) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r2, &(0x7f0000000140)={r1, 0xffffffffffffffff, 0x3d}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = pidfd_open(0x0, 0x0) dup(r3) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 126.847210] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s [ 126.848203] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 126.848931] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 126.849540] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 08 00 [ 126.878382] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 126.879598] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 126.885212] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 126.917788] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 126.920226] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 126.922431] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 126.926038] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 126.927134] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 126.928741] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 126.929666] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 126.930619] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 126.931332] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 126.932222] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 126.933118] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 126.933941] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 126.934905] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 14:24:45 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f00000000c0), 0x12) io_setup(0x9, &(0x7f0000000140)=0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r1, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f00000001c0)=')', 0x1}]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r3, &(0x7f0000002980)=[{{&(0x7f0000000140)={0x2, 0x4e23, @remote}, 0x10, 0x0}}, {{&(0x7f0000001540)={0x2, 0x4e21, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000002900)=[@ip_pktinfo={{0x1c, 0x11, 0x8, {0x0, @private, @private}}}], 0x20}}], 0x2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r4, &(0x7f0000000000), 0xfffffdef) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) 14:24:45 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f00000000c0), 0x12) io_setup(0x9, &(0x7f0000000140)=0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r1, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f00000001c0)=')', 0x1}]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r3, &(0x7f0000002980)=[{{&(0x7f0000000140)={0x2, 0x4e23, @remote}, 0x10, 0x0}}, {{&(0x7f0000001540)={0x2, 0x4e21, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000002900)=[@ip_pktinfo={{0x1c, 0x11, 0x8, {0x0, @private, @private}}}], 0x20}}], 0x2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r4, &(0x7f0000000000), 0xfffffdef) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) [ 127.062094] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s [ 127.062862] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 127.063408] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 127.064195] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 08 00 [ 127.065961] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 127.068107] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 127.068937] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 127.069555] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 127.070195] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 127.070902] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 127.071560] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 127.072162] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 127.174830] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s [ 127.175504] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 127.176006] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 127.176490] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 02 00 14:24:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r0, 0x400, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) 14:24:45 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f00000000c0), 0x12) io_setup(0x9, &(0x7f0000000140)=0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r1, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f00000001c0)=')', 0x1}]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r3, &(0x7f0000002980)=[{{&(0x7f0000000140)={0x2, 0x4e23, @remote}, 0x10, 0x0}}, {{&(0x7f0000001540)={0x2, 0x4e21, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000002900)=[@ip_pktinfo={{0x1c, 0x11, 0x8, {0x0, @private, @private}}}], 0x20}}], 0x2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r4, &(0x7f0000000000), 0xfffffdef) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) [ 127.603205] audit: type=1326 audit(1662992685.899:13): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4038 comm="syz-executor.3" exe="/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe64183cb19 code=0x0 14:24:45 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x53) sendmmsg(r0, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000300)="e9", 0x1}], 0x1}}], 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000200)="b33ee22ad8c71c23bf0f9698bb966f39d5f180a1c1f27d731283d77c972c6baa894c4def51d56f80875cec083384bf7c5c1d9917b87f2b67a46557ac3cd8e2b3318ea70769b3041782d0cae779b71b1f7e81e768475b8aeb8e09b4ab", 0xfffffe02, 0x4000805, 0x0, 0x0) 14:24:45 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f00000000c0), 0x12) io_setup(0x9, &(0x7f0000000140)=0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r1, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f00000001c0)=')', 0x1}]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r3, &(0x7f0000002980)=[{{&(0x7f0000000140)={0x2, 0x4e23, @remote}, 0x10, 0x0}}, {{&(0x7f0000001540)={0x2, 0x4e21, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000002900)=[@ip_pktinfo={{0x1c, 0x11, 0x8, {0x0, @private, @private}}}], 0x20}}], 0x2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r4, &(0x7f0000000000), 0xfffffdef) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) 14:24:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x21) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="440a2dfab6ee34d3d2a0"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') pwritev(r0, &(0x7f00000000c0)=[{0x0}, {&(0x7f0000000000)="dbf225f5a4568675d4b9d93506777ce8e7e1", 0x12}, {&(0x7f0000000240)}], 0x3, 0x8001, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) r3 = syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x254, 0x0, r0}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r2, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) r5 = memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) syz_io_uring_setup(0x7d8d, &(0x7f00000007c0)={0x0, 0xb5f1, 0x20, 0x3, 0x1b5}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000840), &(0x7f0000000880)) fallocate(r5, 0x8, 0x0, 0x8800000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r5, @ANYBLOB="315ec9"]) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x6, r3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x100000) 14:24:45 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x53) sendmmsg(r0, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000300)="e9", 0x1}], 0x1}}], 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000200)="b33ee22ad8c71c23bf0f9698bb966f39d5f180a1c1f27d731283d77c972c6baa894c4def51d56f80875cec083384bf7c5c1d9917b87f2b67a46557ac3cd8e2b3318ea70769b3041782d0cae779b71b1f7e81e768475b8aeb8e09b4ab", 0xfffffe02, 0x4000805, 0x0, 0x0) 14:24:45 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x53) sendmmsg(r0, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000300)="e9", 0x1}], 0x1}}], 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000200)="b33ee22ad8c71c23bf0f9698bb966f39d5f180a1c1f27d731283d77c972c6baa894c4def51d56f80875cec083384bf7c5c1d9917b87f2b67a46557ac3cd8e2b3318ea70769b3041782d0cae779b71b1f7e81e768475b8aeb8e09b4ab", 0xfffffe02, 0x4000805, 0x0, 0x0) 14:24:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x21) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="440a2dfab6ee34d3d2a0"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') pwritev(r0, &(0x7f00000000c0)=[{0x0}, {&(0x7f0000000000)="dbf225f5a4568675d4b9d93506777ce8e7e1", 0x12}, {&(0x7f0000000240)}], 0x3, 0x8001, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) r3 = syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x254, 0x0, r0}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r2, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) r5 = memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) syz_io_uring_setup(0x7d8d, &(0x7f00000007c0)={0x0, 0xb5f1, 0x20, 0x3, 0x1b5}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000840), &(0x7f0000000880)) fallocate(r5, 0x8, 0x0, 0x8800000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r5, @ANYBLOB="315ec9"]) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x6, r3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x100000) [ 127.728968] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s [ 127.730018] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 127.730733] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 127.731407] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 08 00 [ 127.734359] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 127.735359] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 127.736756] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 127.817346] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 127.822072] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 127.828382] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 127.830106] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 127.834500] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 14:24:46 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f00000000c0), 0x12) io_setup(0x9, &(0x7f0000000140)=0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) io_submit(r1, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f00000001c0)=')', 0x1}]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r3, &(0x7f0000002980)=[{{&(0x7f0000000140)={0x2, 0x4e23, @remote}, 0x10, 0x0}}, {{&(0x7f0000001540)={0x2, 0x4e21, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000002900)=[@ip_pktinfo={{0x1c, 0x11, 0x8, {0x0, @private, @private}}}], 0x20}}], 0x2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r4, &(0x7f0000000000), 0xfffffdef) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) [ 127.927945] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 127.929130] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 127.930242] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 127.931314] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 127.932385] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 127.933421] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 127.934427] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 127.936255] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 14:24:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x21) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="440a2dfab6ee34d3d2a0"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') pwritev(r0, &(0x7f00000000c0)=[{0x0}, {&(0x7f0000000000)="dbf225f5a4568675d4b9d93506777ce8e7e1", 0x12}, {&(0x7f0000000240)}], 0x3, 0x8001, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) r3 = syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x254, 0x0, r0}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r2, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) r5 = memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) syz_io_uring_setup(0x7d8d, &(0x7f00000007c0)={0x0, 0xb5f1, 0x20, 0x3, 0x1b5}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000840), &(0x7f0000000880)) fallocate(r5, 0x8, 0x0, 0x8800000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r5, @ANYBLOB="315ec9"]) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x6, r3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x100000) [ 128.217085] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s [ 128.218096] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 128.218818] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 128.219484] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 08 00 [ 128.257365] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 128.264037] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 128.265346] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 128.273724] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 128.275967] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 128.277247] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 128.282109] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 128.283393] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 14:24:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x21) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="440a2dfab6ee34d3d2a0"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') pwritev(r0, &(0x7f00000000c0)=[{0x0}, {&(0x7f0000000000)="dbf225f5a4568675d4b9d93506777ce8e7e1", 0x12}, {&(0x7f0000000240)}], 0x3, 0x8001, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) r3 = syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x254, 0x0, r0}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r2, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) r5 = memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) syz_io_uring_setup(0x7d8d, &(0x7f00000007c0)={0x0, 0xb5f1, 0x20, 0x3, 0x1b5}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000840), &(0x7f0000000880)) fallocate(r5, 0x8, 0x0, 0x8800000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r5, @ANYBLOB="315ec9"]) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x6, r3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x100000) 14:24:46 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000000c0)=0x4, 0x4) sendmsg$inet(r0, &(0x7f0000000ac0)={&(0x7f0000000380)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000000)="fee1", 0xffec}], 0x1}, 0x0) [ 128.461981] IPv4: Oversized IP packet from 127.0.0.1 14:24:46 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x53) sendmmsg(r0, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000300)="e9", 0x1}], 0x1}}], 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000200)="b33ee22ad8c71c23bf0f9698bb966f39d5f180a1c1f27d731283d77c972c6baa894c4def51d56f80875cec083384bf7c5c1d9917b87f2b67a46557ac3cd8e2b3318ea70769b3041782d0cae779b71b1f7e81e768475b8aeb8e09b4ab", 0xfffffe02, 0x4000805, 0x0, 0x0) 14:24:46 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000000c0)=0x4, 0x4) sendmsg$inet(r0, &(0x7f0000000ac0)={&(0x7f0000000380)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000000)="fee1", 0xffec}], 0x1}, 0x0) 14:24:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r0, 0x400, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) [ 128.556331] IPv4: Oversized IP packet from 127.0.0.1 [ 128.565304] audit: type=1326 audit(1662992686.861:14): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4068 comm="syz-executor.3" exe="/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe64183cb19 code=0x0 14:24:46 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x53) sendmmsg(r0, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000300)="e9", 0x1}], 0x1}}], 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000200)="b33ee22ad8c71c23bf0f9698bb966f39d5f180a1c1f27d731283d77c972c6baa894c4def51d56f80875cec083384bf7c5c1d9917b87f2b67a46557ac3cd8e2b3318ea70769b3041782d0cae779b71b1f7e81e768475b8aeb8e09b4ab", 0xfffffe02, 0x4000805, 0x0, 0x0) 14:24:47 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000000c0)=0x4, 0x4) sendmsg$inet(r0, &(0x7f0000000ac0)={&(0x7f0000000380)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000000)="fee1", 0xffec}], 0x1}, 0x0) 14:24:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r0, 0x400, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) 14:24:47 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x4d031, 0xffffffffffffffff, 0x0) 14:24:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x21) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="440a2dfab6ee34d3d2a0"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') pwritev(r0, &(0x7f00000000c0)=[{0x0}, {&(0x7f0000000000)="dbf225f5a4568675d4b9d93506777ce8e7e1", 0x12}, {&(0x7f0000000240)}], 0x3, 0x8001, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) r3 = syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x254, 0x0, r0}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r2, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) r5 = memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) syz_io_uring_setup(0x7d8d, &(0x7f00000007c0)={0x0, 0xb5f1, 0x20, 0x3, 0x1b5}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000840), &(0x7f0000000880)) fallocate(r5, 0x8, 0x0, 0x8800000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r5, @ANYBLOB="315ec9"]) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x6, r3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x100000) 14:24:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x21) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="440a2dfab6ee34d3d2a0"], &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)='cramfs\x00', 0x1000, &(0x7f0000000400)='\x00') pwritev(r0, &(0x7f00000000c0)=[{0x0}, {&(0x7f0000000000)="dbf225f5a4568675d4b9d93506777ce8e7e1", 0x12}, {&(0x7f0000000240)}], 0x3, 0x8001, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x40) r3 = syz_io_uring_setup(0x15971, &(0x7f0000000180)={0x0, 0x4494, 0x2, 0x1, 0x254, 0x0, r0}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r2, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) r5 = memfd_create(&(0x7f0000000440)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\xe3g\v\xca(\x96\xe1C\xdf\x1c\xea\x85CD1\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r,\x87\xe6]^j\xcd\x06\xea\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfeW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\x7f\n\x1a\xda.\x94kJ\xe2\x82_\x8905\xcc\xb0\xc6\x94\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba`\x14\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3\x04\x00\x00\x00T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f 4|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bwEI\xb1\x00'/567, 0x0) syz_io_uring_setup(0x7d8d, &(0x7f00000007c0)={0x0, 0xb5f1, 0x20, 0x3, 0x1b5}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000840), &(0x7f0000000880)) fallocate(r5, 0x8, 0x0, 0x8800000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r5, @ANYBLOB="315ec9"]) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x6, r3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x100000) 14:24:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r0, 0x400, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) 14:24:47 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_COALESCE_RX_USECS_HIGH={0x8}, @ETHTOOL_A_COALESCE_RX_USECS_LOW={0x8, 0xe, 0x4}, @ETHTOOL_A_COALESCE_RX_USECS_HIGH={0x8}]}, 0x2c}}, 0x0) [ 129.473748] audit: type=1326 audit(1662992687.769:15): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4075 comm="syz-executor.4" exe="/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe98ff44b19 code=0x0 14:24:47 executing program 7: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet6(r0, &(0x7f0000000000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, 0x1c, &(0x7f0000000040)=[{&(0x7f0000000140)="8f857635", 0x4}], 0x1}}], 0x1, 0x0) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe85}, 0x0) ioctl$SIOCGSTAMP(r0, 0x80108906, &(0x7f0000000000)) [ 129.493914] IPv4: Oversized IP packet from 127.0.0.1 [ 129.499579] audit: type=1326 audit(1662992687.778:16): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4080 comm="syz-executor.3" exe="/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe64183cb19 code=0x0 14:24:47 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_int(r0, 0x0, 0x6, 0x0, &(0x7f0000000080)) 14:24:47 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_COALESCE_RX_USECS_HIGH={0x8}, @ETHTOOL_A_COALESCE_RX_USECS_LOW={0x8, 0xe, 0x4}, @ETHTOOL_A_COALESCE_RX_USECS_HIGH={0x8}]}, 0x2c}}, 0x0) 14:24:47 executing program 7: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet6(r0, &(0x7f0000000000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, 0x1c, &(0x7f0000000040)=[{&(0x7f0000000140)="8f857635", 0x4}], 0x1}}], 0x1, 0x0) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe85}, 0x0) ioctl$SIOCGSTAMP(r0, 0x80108906, &(0x7f0000000000)) 14:24:47 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x4d031, 0xffffffffffffffff, 0x0) 14:24:47 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_int(r0, 0x0, 0x6, 0x0, &(0x7f0000000080)) 14:24:47 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_COALESCE_RX_USECS_HIGH={0x8}, @ETHTOOL_A_COALESCE_RX_USECS_LOW={0x8, 0xe, 0x4}, @ETHTOOL_A_COALESCE_RX_USECS_HIGH={0x8}]}, 0x2c}}, 0x0) VM DIAGNOSIS: 14:24:38 Registers: info registers vcpu 0 RAX=000000000000005d RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b1e41 RDI=ffffffff8763fae0 RBP=ffffffff8763faa0 RSP=ffff88804031f698 R8 =0000000000000001 R9 =000000000000000a R10=000000000000005d R11=0000000000000001 R12=000000000000005d R13=ffffffff8763faa0 R14=0000000000000010 R15=ffffffff822b1e30 RIP=ffffffff822b1e99 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fe63ed91700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f72641a89f0 CR3=000000003fd08000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007fe6419237c0 00007fe6419237c8 YMM02=0000000000000000 0000000000000000 00007fe6419237e0 00007fe6419237c0 YMM03=0000000000000000 0000000000000000 00007fe6419237c8 00007fe6419237c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000080000001 RBX=00000000ffffffff RCX=0000000000000000 RDX=0000000000000001 RSI=ffff888040567678 RDI=0000000000000001 RBP=ffff888040560000 RSP=ffff8880405674b8 R8 =ffffffff85e796d8 R9 =ffffffff85e796dc R10=ffffed10080aceb6 R11=ffff888040567588 R12=ffff888040567589 R13=ffff8880405675a8 R14=ffff888040567548 R15=0000000000000005 RIP=ffffffff812038af RFL=00000297 [--S-APC] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f2618b44610 CR3=000000003eaf4000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00362e6f732e6362 696c2f756e672d78 YMM02=0000000000000000 0000000000000000 ffff0000000000ff ffffffffffffffff YMM03=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffffff YMM04=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000