Warning: Permanently added '[localhost]:44515' (ECDSA) to the list of known hosts. 2022/09/15 11:46:16 fuzzer started 2022/09/15 11:46:16 dialing manager at localhost:36559 syzkaller login: [ 38.441371] cgroup: Unknown subsys name 'net' [ 38.541532] cgroup: Unknown subsys name 'rlimit' 2022/09/15 11:46:32 syscalls: 2215 2022/09/15 11:46:32 code coverage: enabled 2022/09/15 11:46:32 comparison tracing: enabled 2022/09/15 11:46:32 extra coverage: enabled 2022/09/15 11:46:32 setuid sandbox: enabled 2022/09/15 11:46:32 namespace sandbox: enabled 2022/09/15 11:46:32 Android sandbox: enabled 2022/09/15 11:46:32 fault injection: enabled 2022/09/15 11:46:32 leak checking: enabled 2022/09/15 11:46:32 net packet injection: enabled 2022/09/15 11:46:32 net device setup: enabled 2022/09/15 11:46:32 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/15 11:46:32 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/15 11:46:32 USB emulation: enabled 2022/09/15 11:46:32 hci packet injection: enabled 2022/09/15 11:46:32 wifi device emulation: failed to parse kernel version (6.0.0-rc5-next-20220915) 2022/09/15 11:46:32 802.15.4 emulation: enabled 2022/09/15 11:46:32 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/15 11:46:32 fetching corpus: 50, signal 29251/32502 (executing program) 2022/09/15 11:46:32 fetching corpus: 100, signal 41958/46429 (executing program) 2022/09/15 11:46:32 fetching corpus: 150, signal 53121/58499 (executing program) 2022/09/15 11:46:32 fetching corpus: 200, signal 60124/66433 (executing program) 2022/09/15 11:46:32 fetching corpus: 250, signal 64964/72199 (executing program) 2022/09/15 11:46:32 fetching corpus: 300, signal 71207/79205 (executing program) 2022/09/15 11:46:33 fetching corpus: 350, signal 75195/84017 (executing program) 2022/09/15 11:46:33 fetching corpus: 400, signal 80185/89552 (executing program) 2022/09/15 11:46:33 fetching corpus: 450, signal 85095/94921 (executing program) 2022/09/15 11:46:33 fetching corpus: 500, signal 88737/99081 (executing program) 2022/09/15 11:46:33 fetching corpus: 550, signal 92826/103538 (executing program) 2022/09/15 11:46:33 fetching corpus: 600, signal 97911/108736 (executing program) 2022/09/15 11:46:34 fetching corpus: 650, signal 99685/111133 (executing program) 2022/09/15 11:46:34 fetching corpus: 700, signal 102481/114262 (executing program) 2022/09/15 11:46:34 fetching corpus: 750, signal 104130/116385 (executing program) 2022/09/15 11:46:34 fetching corpus: 800, signal 107174/119616 (executing program) 2022/09/15 11:46:34 fetching corpus: 850, signal 109269/121985 (executing program) 2022/09/15 11:46:34 fetching corpus: 900, signal 112523/125229 (executing program) 2022/09/15 11:46:34 fetching corpus: 950, signal 114823/127655 (executing program) 2022/09/15 11:46:35 fetching corpus: 1000, signal 116458/129508 (executing program) 2022/09/15 11:46:35 fetching corpus: 1050, signal 118233/131437 (executing program) 2022/09/15 11:46:35 fetching corpus: 1100, signal 120973/134026 (executing program) 2022/09/15 11:46:35 fetching corpus: 1150, signal 123386/136294 (executing program) 2022/09/15 11:46:35 fetching corpus: 1200, signal 124726/137785 (executing program) 2022/09/15 11:46:35 fetching corpus: 1250, signal 125879/139104 (executing program) 2022/09/15 11:46:35 fetching corpus: 1300, signal 126923/140320 (executing program) 2022/09/15 11:46:35 fetching corpus: 1350, signal 129420/142482 (executing program) 2022/09/15 11:46:36 fetching corpus: 1400, signal 131540/144333 (executing program) 2022/09/15 11:46:36 fetching corpus: 1450, signal 133320/146110 (executing program) 2022/09/15 11:46:36 fetching corpus: 1500, signal 134861/147525 (executing program) 2022/09/15 11:46:36 fetching corpus: 1550, signal 136508/149041 (executing program) 2022/09/15 11:46:36 fetching corpus: 1600, signal 139114/151025 (executing program) 2022/09/15 11:46:36 fetching corpus: 1650, signal 141190/152623 (executing program) 2022/09/15 11:46:37 fetching corpus: 1700, signal 142789/153940 (executing program) 2022/09/15 11:46:37 fetching corpus: 1750, signal 144075/154972 (executing program) 2022/09/15 11:46:37 fetching corpus: 1800, signal 145339/155998 (executing program) 2022/09/15 11:46:37 fetching corpus: 1850, signal 147234/157294 (executing program) 2022/09/15 11:46:37 fetching corpus: 1900, signal 148151/158014 (executing program) 2022/09/15 11:46:37 fetching corpus: 1950, signal 149945/159212 (executing program) 2022/09/15 11:46:38 fetching corpus: 2000, signal 152035/160458 (executing program) 2022/09/15 11:46:38 fetching corpus: 2050, signal 153879/161683 (executing program) 2022/09/15 11:46:38 fetching corpus: 2100, signal 155308/162509 (executing program) 2022/09/15 11:46:38 fetching corpus: 2150, signal 156547/163232 (executing program) 2022/09/15 11:46:38 fetching corpus: 2200, signal 157726/163997 (executing program) 2022/09/15 11:46:38 fetching corpus: 2250, signal 159106/164744 (executing program) 2022/09/15 11:46:38 fetching corpus: 2300, signal 160168/165396 (executing program) 2022/09/15 11:46:39 fetching corpus: 2350, signal 161515/166143 (executing program) 2022/09/15 11:46:39 fetching corpus: 2400, signal 162748/166737 (executing program) 2022/09/15 11:46:39 fetching corpus: 2450, signal 163971/167341 (executing program) 2022/09/15 11:46:39 fetching corpus: 2456, signal 164027/167432 (executing program) 2022/09/15 11:46:39 fetching corpus: 2456, signal 164027/167501 (executing program) 2022/09/15 11:46:39 fetching corpus: 2456, signal 164027/167561 (executing program) 2022/09/15 11:46:39 fetching corpus: 2456, signal 164027/167635 (executing program) 2022/09/15 11:46:39 fetching corpus: 2456, signal 164027/167698 (executing program) 2022/09/15 11:46:39 fetching corpus: 2456, signal 164027/167767 (executing program) 2022/09/15 11:46:39 fetching corpus: 2456, signal 164027/167847 (executing program) 2022/09/15 11:46:39 fetching corpus: 2456, signal 164027/167914 (executing program) 2022/09/15 11:46:39 fetching corpus: 2456, signal 164027/167982 (executing program) 2022/09/15 11:46:39 fetching corpus: 2456, signal 164027/168039 (executing program) 2022/09/15 11:46:39 fetching corpus: 2456, signal 164027/168099 (executing program) 2022/09/15 11:46:39 fetching corpus: 2456, signal 164027/168173 (executing program) 2022/09/15 11:46:39 fetching corpus: 2456, signal 164027/168255 (executing program) 2022/09/15 11:46:39 fetching corpus: 2456, signal 164027/168320 (executing program) 2022/09/15 11:46:39 fetching corpus: 2456, signal 164027/168383 (executing program) 2022/09/15 11:46:39 fetching corpus: 2456, signal 164027/168444 (executing program) 2022/09/15 11:46:39 fetching corpus: 2456, signal 164027/168498 (executing program) 2022/09/15 11:46:39 fetching corpus: 2456, signal 164027/168574 (executing program) 2022/09/15 11:46:39 fetching corpus: 2456, signal 164027/168635 (executing program) 2022/09/15 11:46:39 fetching corpus: 2456, signal 164027/168726 (executing program) 2022/09/15 11:46:39 fetching corpus: 2456, signal 164027/168790 (executing program) 2022/09/15 11:46:39 fetching corpus: 2456, signal 164027/168855 (executing program) 2022/09/15 11:46:39 fetching corpus: 2456, signal 164027/168939 (executing program) 2022/09/15 11:46:39 fetching corpus: 2456, signal 164027/169017 (executing program) 2022/09/15 11:46:39 fetching corpus: 2456, signal 164027/169086 (executing program) 2022/09/15 11:46:39 fetching corpus: 2456, signal 164027/169170 (executing program) 2022/09/15 11:46:39 fetching corpus: 2456, signal 164027/169246 (executing program) 2022/09/15 11:46:39 fetching corpus: 2456, signal 164027/169326 (executing program) 2022/09/15 11:46:39 fetching corpus: 2456, signal 164027/169393 (executing program) 2022/09/15 11:46:39 fetching corpus: 2456, signal 164027/169454 (executing program) 2022/09/15 11:46:39 fetching corpus: 2456, signal 164027/169520 (executing program) 2022/09/15 11:46:39 fetching corpus: 2456, signal 164027/169522 (executing program) 2022/09/15 11:46:39 fetching corpus: 2456, signal 164027/169522 (executing program) 2022/09/15 11:46:42 starting 8 fuzzer processes 11:46:42 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="02000500000008"], 0x125) read(r0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) socket$nl_route(0x10, 0x3, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)) socket$nl_route(0x10, 0x3, 0x0) 11:46:42 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) migrate_pages(0x0, 0x9, 0x0, &(0x7f0000000180)=0x10001) 11:46:42 executing program 2: madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x16) madvise(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8) 11:46:42 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000540), 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000580)) [ 63.461016] audit: type=1400 audit(1663242402.643:6): avc: denied { execmem } for pid=291 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 11:46:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000002080)={0x0, 0x0, &(0x7f0000002040)={&(0x7f0000001ec0)={0x14}, 0x14}}, 0x0) 11:46:42 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000440)={0x2, &(0x7f00000003c0)=[{0xe50, 0x2c, 0xaf}, {0x9, 0xf3, 0x1f, 0xfffff001}]}) 11:46:42 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x0) 11:46:42 executing program 7: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x12b008, 0x0) creat(&(0x7f0000000240)='./file1\x00', 0x0) mount$9p_unix(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x2000, 0x0) [ 64.893666] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 64.896107] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 64.898454] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 64.899785] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 64.901461] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 64.902971] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 64.905040] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 64.906228] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 64.907317] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 64.914955] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 64.916682] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 64.918166] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 64.919473] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 64.920786] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 64.921793] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 64.924626] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 64.925832] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 64.928994] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 64.933080] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 64.935562] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 64.937438] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 64.938572] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 64.939980] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 64.941818] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 64.943735] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 64.945232] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 64.946795] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 64.948110] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 64.949499] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 64.950805] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 64.952060] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 64.953476] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 64.954733] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 64.955859] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 64.957192] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 64.959642] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 64.965785] Bluetooth: hci2: HCI_REQ-0x0c1a [ 64.966979] Bluetooth: hci3: HCI_REQ-0x0c1a [ 64.969471] Bluetooth: hci1: HCI_REQ-0x0c1a [ 64.972943] Bluetooth: hci4: HCI_REQ-0x0c1a [ 64.976253] Bluetooth: hci0: HCI_REQ-0x0c1a [ 64.990278] Bluetooth: hci5: HCI_REQ-0x0c1a [ 65.015219] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 65.017469] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 65.019003] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 65.021822] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 65.023736] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 65.025275] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 65.030085] Bluetooth: hci6: HCI_REQ-0x0c1a [ 65.030841] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 65.038889] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 65.040911] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 65.043918] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 65.046673] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 65.048280] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 65.053025] Bluetooth: hci7: HCI_REQ-0x0c1a [ 67.018764] Bluetooth: hci0: command 0x0409 tx timeout [ 67.019593] Bluetooth: hci2: command 0x0409 tx timeout [ 67.020086] Bluetooth: hci4: command 0x0409 tx timeout [ 67.020612] Bluetooth: hci5: command 0x0409 tx timeout [ 67.021477] Bluetooth: hci3: command 0x0409 tx timeout [ 67.021968] Bluetooth: hci1: command 0x0409 tx timeout [ 67.081157] Bluetooth: hci7: command 0x0409 tx timeout [ 67.081189] Bluetooth: hci6: command 0x0409 tx timeout [ 69.065234] Bluetooth: hci1: command 0x041b tx timeout [ 69.065765] Bluetooth: hci3: command 0x041b tx timeout [ 69.066705] Bluetooth: hci5: command 0x041b tx timeout [ 69.067187] Bluetooth: hci4: command 0x041b tx timeout [ 69.067603] Bluetooth: hci2: command 0x041b tx timeout [ 69.068612] Bluetooth: hci0: command 0x041b tx timeout [ 69.129175] Bluetooth: hci6: command 0x041b tx timeout [ 69.130192] Bluetooth: hci7: command 0x041b tx timeout [ 71.113436] Bluetooth: hci0: command 0x040f tx timeout [ 71.113960] Bluetooth: hci2: command 0x040f tx timeout [ 71.114514] Bluetooth: hci4: command 0x040f tx timeout [ 71.115270] Bluetooth: hci5: command 0x040f tx timeout [ 71.115697] Bluetooth: hci3: command 0x040f tx timeout [ 71.116153] Bluetooth: hci1: command 0x040f tx timeout [ 71.177204] Bluetooth: hci7: command 0x040f tx timeout [ 71.178555] Bluetooth: hci6: command 0x040f tx timeout [ 73.162223] Bluetooth: hci1: command 0x0419 tx timeout [ 73.162724] Bluetooth: hci3: command 0x0419 tx timeout [ 73.163191] Bluetooth: hci5: command 0x0419 tx timeout [ 73.163837] Bluetooth: hci4: command 0x0419 tx timeout [ 73.165154] Bluetooth: hci2: command 0x0419 tx timeout [ 73.165571] Bluetooth: hci0: command 0x0419 tx timeout [ 73.226231] Bluetooth: hci6: command 0x0419 tx timeout [ 73.226969] Bluetooth: hci7: command 0x0419 tx timeout 11:47:37 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000540), 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000580)) 11:47:37 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000540), 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000580)) 11:47:37 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000540), 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000580)) [ 118.803996] audit: type=1400 audit(1663242457.986:7): avc: denied { open } for pid=3883 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 118.806057] audit: type=1400 audit(1663242457.986:8): avc: denied { kernel } for pid=3883 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 118.819612] ------------[ cut here ]------------ [ 118.819637] [ 118.819641] ====================================================== [ 118.819644] WARNING: possible circular locking dependency detected [ 118.819649] 6.0.0-rc5-next-20220915 #1 Not tainted [ 118.819656] ------------------------------------------------------ [ 118.819659] syz-executor.0/3884 is trying to acquire lock: [ 118.819666] ffffffff853fa878 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 118.819704] [ 118.819704] but task is already holding lock: [ 118.819707] ffff888009a24420 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 118.819736] [ 118.819736] which lock already depends on the new lock. [ 118.819736] [ 118.819739] [ 118.819739] the existing dependency chain (in reverse order) is: [ 118.819742] [ 118.819742] -> #3 (&ctx->lock){....}-{2:2}: [ 118.819756] _raw_spin_lock+0x2a/0x40 [ 118.819774] __perf_event_task_sched_out+0x53b/0x18d0 [ 118.819787] __schedule+0xedd/0x2470 [ 118.819798] schedule+0xda/0x1b0 [ 118.819808] exit_to_user_mode_prepare+0x114/0x1a0 [ 118.819829] syscall_exit_to_user_mode+0x19/0x40 [ 118.819848] do_syscall_64+0x48/0x90 [ 118.819862] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 118.819884] [ 118.819884] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 118.819898] _raw_spin_lock_nested+0x30/0x40 [ 118.819913] raw_spin_rq_lock_nested+0x1e/0x30 [ 118.819929] task_fork_fair+0x63/0x4d0 [ 118.819947] sched_cgroup_fork+0x3d0/0x540 [ 118.819961] copy_process+0x4183/0x6e20 [ 118.819972] kernel_clone+0xe7/0x890 [ 118.819981] user_mode_thread+0xad/0xf0 [ 118.819991] rest_init+0x24/0x250 [ 118.820008] arch_call_rest_init+0xf/0x14 [ 118.820021] start_kernel+0x4c1/0x4e6 [ 118.820031] secondary_startup_64_no_verify+0xe0/0xeb [ 118.820046] [ 118.820046] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 118.820060] _raw_spin_lock_irqsave+0x39/0x60 [ 118.820075] try_to_wake_up+0xab/0x1920 [ 118.820089] up+0x75/0xb0 [ 118.820100] __up_console_sem+0x6e/0x80 [ 118.820117] console_unlock+0x46a/0x590 [ 118.820133] vt_ioctl+0x2822/0x2ca0 [ 118.820146] tty_ioctl+0x7c4/0x1700 [ 118.820159] __x64_sys_ioctl+0x19a/0x210 [ 118.820175] do_syscall_64+0x3b/0x90 [ 118.820189] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 118.820206] [ 118.820206] -> #0 ((console_sem).lock){....}-{2:2}: [ 118.820220] __lock_acquire+0x2a02/0x5e70 [ 118.820237] lock_acquire+0x1a2/0x530 [ 118.820253] _raw_spin_lock_irqsave+0x39/0x60 [ 118.820268] down_trylock+0xe/0x70 [ 118.820281] __down_trylock_console_sem+0x3b/0xd0 [ 118.820297] vprintk_emit+0x16b/0x560 [ 118.820314] vprintk+0x84/0xa0 [ 118.820330] _printk+0xba/0xf1 [ 118.820349] report_bug.cold+0x72/0xab [ 118.820362] handle_bug+0x3c/0x70 [ 118.820376] exc_invalid_op+0x14/0x50 [ 118.820390] asm_exc_invalid_op+0x16/0x20 [ 118.820406] group_sched_out.part.0+0x2c7/0x460 [ 118.820417] ctx_sched_out+0x8f1/0xc10 [ 118.820427] __perf_event_task_sched_out+0x6d0/0x18d0 [ 118.820439] __schedule+0xedd/0x2470 [ 118.820449] schedule+0xda/0x1b0 [ 118.820459] exit_to_user_mode_prepare+0x114/0x1a0 [ 118.820478] syscall_exit_to_user_mode+0x19/0x40 [ 118.820496] do_syscall_64+0x48/0x90 [ 118.820510] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 118.820527] [ 118.820527] other info that might help us debug this: [ 118.820527] [ 118.820530] Chain exists of: [ 118.820530] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 118.820530] [ 118.820545] Possible unsafe locking scenario: [ 118.820545] [ 118.820547] CPU0 CPU1 [ 118.820550] ---- ---- [ 118.820552] lock(&ctx->lock); [ 118.820558] lock(&rq->__lock); [ 118.820564] lock(&ctx->lock); [ 118.820570] lock((console_sem).lock); [ 118.820576] [ 118.820576] *** DEADLOCK *** [ 118.820576] [ 118.820578] 2 locks held by syz-executor.0/3884: [ 118.820585] #0: ffff88806ce37cd8 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 118.820611] #1: ffff888009a24420 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 118.820638] [ 118.820638] stack backtrace: [ 118.820641] CPU: 0 PID: 3884 Comm: syz-executor.0 Not tainted 6.0.0-rc5-next-20220915 #1 [ 118.820654] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 118.820662] Call Trace: [ 118.820665] [ 118.820670] dump_stack_lvl+0x8b/0xb3 [ 118.820686] check_noncircular+0x263/0x2e0 [ 118.820718] ? format_decode+0x26c/0xb50 [ 118.820735] ? print_circular_bug+0x450/0x450 [ 118.820752] ? enable_ptr_key_workfn+0x20/0x20 [ 118.820767] ? format_decode+0x26c/0xb50 [ 118.820783] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 118.820801] __lock_acquire+0x2a02/0x5e70 [ 118.820824] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 118.820847] lock_acquire+0x1a2/0x530 [ 118.820864] ? down_trylock+0xe/0x70 [ 118.820878] ? rcu_read_unlock+0x40/0x40 [ 118.820900] ? vprintk+0x84/0xa0 [ 118.820918] _raw_spin_lock_irqsave+0x39/0x60 [ 118.820934] ? down_trylock+0xe/0x70 [ 118.820948] down_trylock+0xe/0x70 [ 118.820961] ? vprintk+0x84/0xa0 [ 118.820979] __down_trylock_console_sem+0x3b/0xd0 [ 118.820996] vprintk_emit+0x16b/0x560 [ 118.821016] vprintk+0x84/0xa0 [ 118.821034] _printk+0xba/0xf1 [ 118.821052] ? record_print_text.cold+0x16/0x16 [ 118.821075] ? report_bug.cold+0x66/0xab [ 118.821090] ? group_sched_out.part.0+0x2c7/0x460 [ 118.821102] report_bug.cold+0x72/0xab [ 118.821117] handle_bug+0x3c/0x70 [ 118.821132] exc_invalid_op+0x14/0x50 [ 118.821147] asm_exc_invalid_op+0x16/0x20 [ 118.821165] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 118.821178] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 118.821189] RSP: 0018:ffff88801e1ffc48 EFLAGS: 00010006 [ 118.821199] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 118.821206] RDX: ffff88801ae4d040 RSI: ffffffff81566027 RDI: 0000000000000005 [ 118.821214] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 118.821221] R10: 0000000000000000 R11: ffffffff865ac01b R12: ffff888009a24400 [ 118.821229] R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 118.821241] ? group_sched_out.part.0+0x2c7/0x460 [ 118.821254] ? group_sched_out.part.0+0x2c7/0x460 [ 118.821267] ctx_sched_out+0x8f1/0xc10 [ 118.821279] __perf_event_task_sched_out+0x6d0/0x18d0 [ 118.821295] ? lock_is_held_type+0xd7/0x130 [ 118.821314] ? __perf_cgroup_move+0x160/0x160 [ 118.821326] ? set_next_entity+0x304/0x550 [ 118.821344] ? update_curr+0x267/0x740 [ 118.821363] ? lock_is_held_type+0xd7/0x130 [ 118.821382] __schedule+0xedd/0x2470 [ 118.821396] ? io_schedule_timeout+0x150/0x150 [ 118.821409] ? rcu_read_lock_sched_held+0x3e/0x80 [ 118.821431] schedule+0xda/0x1b0 [ 118.821442] exit_to_user_mode_prepare+0x114/0x1a0 [ 118.821463] syscall_exit_to_user_mode+0x19/0x40 [ 118.821482] do_syscall_64+0x48/0x90 [ 118.821497] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 118.821515] RIP: 0033:0x7f36afbecb19 [ 118.821524] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 118.821535] RSP: 002b:00007f36ad162218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 118.821546] RAX: 0000000000000001 RBX: 00007f36afcfff68 RCX: 00007f36afbecb19 [ 118.821553] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f36afcfff6c [ 118.821561] RBP: 00007f36afcfff60 R08: 000000000000000e R09: 0000000000000000 [ 118.821568] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f36afcfff6c [ 118.821575] R13: 00007ffea9338f8f R14: 00007f36ad162300 R15: 0000000000022000 [ 118.821588] [ 118.876014] WARNING: CPU: 0 PID: 3884 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 118.876682] Modules linked in: [ 118.876936] CPU: 0 PID: 3884 Comm: syz-executor.0 Not tainted 6.0.0-rc5-next-20220915 #1 [ 118.877528] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 118.878336] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 118.878732] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 118.880040] RSP: 0018:ffff88801e1ffc48 EFLAGS: 00010006 [ 118.880421] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 118.880942] RDX: ffff88801ae4d040 RSI: ffffffff81566027 RDI: 0000000000000005 [ 118.881461] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 118.881977] R10: 0000000000000000 R11: ffffffff865ac01b R12: ffff888009a24400 [ 118.882498] R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 118.883020] FS: 00007f36ad162700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 118.883617] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 118.884040] CR2: 000055b2e87aa080 CR3: 000000001765a000 CR4: 0000000000350ef0 [ 118.884557] Call Trace: [ 118.884754] [ 118.884926] ctx_sched_out+0x8f1/0xc10 [ 118.885221] __perf_event_task_sched_out+0x6d0/0x18d0 [ 118.885603] ? lock_is_held_type+0xd7/0x130 [ 118.885923] ? __perf_cgroup_move+0x160/0x160 [ 118.886255] ? set_next_entity+0x304/0x550 [ 118.886569] ? update_curr+0x267/0x740 [ 118.886866] ? lock_is_held_type+0xd7/0x130 [ 118.887186] __schedule+0xedd/0x2470 [ 118.887463] ? io_schedule_timeout+0x150/0x150 [ 118.887804] ? rcu_read_lock_sched_held+0x3e/0x80 [ 118.888169] schedule+0xda/0x1b0 [ 118.888429] exit_to_user_mode_prepare+0x114/0x1a0 [ 118.888811] syscall_exit_to_user_mode+0x19/0x40 [ 118.889171] do_syscall_64+0x48/0x90 [ 118.889447] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 118.889829] RIP: 0033:0x7f36afbecb19 [ 118.890103] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 118.891422] RSP: 002b:00007f36ad162218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 118.891976] RAX: 0000000000000001 RBX: 00007f36afcfff68 RCX: 00007f36afbecb19 [ 118.892491] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f36afcfff6c [ 118.893024] RBP: 00007f36afcfff60 R08: 000000000000000e R09: 0000000000000000 [ 118.893537] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f36afcfff6c [ 118.894061] R13: 00007ffea9338f8f R14: 00007f36ad162300 R15: 0000000000022000 [ 118.894584] [ 118.894758] irq event stamp: 800 [ 118.895008] hardirqs last enabled at (799): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 118.895695] hardirqs last disabled at (800): [] __schedule+0x1225/0x2470 [ 118.896289] softirqs last enabled at (788): [] __irq_exit_rcu+0x11b/0x180 [ 118.896920] softirqs last disabled at (651): [] __irq_exit_rcu+0x11b/0x180 [ 118.897541] ---[ end trace 0000000000000000 ]--- 11:47:38 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000540), 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000580)) 11:47:38 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000540), 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000580)) 11:47:38 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000540), 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000580)) 11:47:38 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x24, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @void}}}, 0x24}}, 0x0) 11:47:38 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x24, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @void}}}, 0x24}}, 0x0) [ 119.375749] sg_write: data in/out 524252/251 bytes for SCSI command 0x0-- guessing data in; [ 119.375749] program syz-executor.0 not setting count and/or reply_len properly [ 119.901352] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3965 comm=syz-executor.4 11:47:39 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="02000500000008"], 0x125) read(r0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) socket$nl_route(0x10, 0x3, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)) socket$nl_route(0x10, 0x3, 0x0) 11:47:39 executing program 2: madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x16) madvise(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8) 11:47:39 executing program 7: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x12b008, 0x0) creat(&(0x7f0000000240)='./file1\x00', 0x0) mount$9p_unix(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x2000, 0x0) 11:47:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000002080)={0x0, 0x0, &(0x7f0000002040)={&(0x7f0000001ec0)={0x14}, 0x14}}, 0x0) 11:47:39 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x0) 11:47:39 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x0) 11:47:39 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x24, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @void}}}, 0x24}}, 0x0) 11:47:39 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) migrate_pages(0x0, 0x9, 0x0, &(0x7f0000000180)=0x10001) [ 120.108534] sg_write: data in/out 524252/251 bytes for SCSI command 0x0-- guessing data in; [ 120.108534] program syz-executor.0 not setting count and/or reply_len properly [ 120.126514] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3991 comm=syz-executor.4 11:47:39 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x0) 11:47:39 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x24, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @void}}}, 0x24}}, 0x0) 11:47:39 executing program 2: madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x16) madvise(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8) 11:47:39 executing program 7: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x12b008, 0x0) creat(&(0x7f0000000240)='./file1\x00', 0x0) mount$9p_unix(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x2000, 0x0) 11:47:39 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x0) 11:47:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000002080)={0x0, 0x0, &(0x7f0000002040)={&(0x7f0000001ec0)={0x14}, 0x14}}, 0x0) 11:47:39 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) migrate_pages(0x0, 0x9, 0x0, &(0x7f0000000180)=0x10001) 11:47:39 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x0) [ 120.287749] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4007 comm=syz-executor.4 11:47:39 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="02000500000008"], 0x125) read(r0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) socket$nl_route(0x10, 0x3, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)) socket$nl_route(0x10, 0x3, 0x0) 11:47:39 executing program 2: madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x16) madvise(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8) 11:47:39 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) migrate_pages(0x0, 0x9, 0x0, &(0x7f0000000180)=0x10001) 11:47:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000002080)={0x0, 0x0, &(0x7f0000002040)={&(0x7f0000001ec0)={0x14}, 0x14}}, 0x0) 11:47:39 executing program 6: syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x0, 0x0, 0x0, 0x4) io_uring_setup(0x65b0, &(0x7f0000000040)={0x0, 0x0, 0x2, 0x3, 0x28a}) 11:47:39 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x0) 11:47:39 executing program 7: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x12b008, 0x0) creat(&(0x7f0000000240)='./file1\x00', 0x0) mount$9p_unix(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x2000, 0x0) 11:47:39 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/raw\x00') pread64(r0, &(0x7f0000000000)=""/185, 0xb9, 0xf95) [ 120.418958] sg_write: data in/out 524252/251 bytes for SCSI command 0x0-- guessing data in; [ 120.418958] program syz-executor.0 not setting count and/or reply_len properly [ 120.446779] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4021 comm=syz-executor.4 11:47:39 executing program 6: socket$inet6_icmp(0xa, 0x2, 0x11) 11:47:39 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/raw\x00') pread64(r0, &(0x7f0000000000)=""/185, 0xb9, 0xf95) 11:47:39 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="001101000751"], 0x90) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, 0x0, 0x0) 11:47:39 executing program 6: socket$inet6_icmp(0xa, 0x2, 0x11) 11:47:39 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX, @ANYBLOB='d']) [ 120.539830] tmpfs: Bad value for 'gid' [ 120.543333] tmpfs: Bad value for 'gid' 11:47:39 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/raw\x00') pread64(r0, &(0x7f0000000000)=""/185, 0xb9, 0xf95) 11:47:39 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="001101000751"], 0x90) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, 0x0, 0x0) 11:47:39 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="001101000751"], 0x90) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, 0x0, 0x0) [ 120.659798] tmpfs: Bad value for 'gid' 11:47:39 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="02000500000008"], 0x125) read(r0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) socket$nl_route(0x10, 0x3, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)) socket$nl_route(0x10, 0x3, 0x0) 11:47:39 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="001101000751"], 0x90) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, 0x0, 0x0) 11:47:39 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/raw\x00') pread64(r0, &(0x7f0000000000)=""/185, 0xb9, 0xf95) 11:47:39 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="001101000751"], 0x90) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, 0x0, 0x0) 11:47:39 executing program 2: chdir(&(0x7f00000000c0)='./file0\x00') io_setup(0x6, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000080)={0x200017e}) io_submit(0x0, 0x1, &(0x7f0000000480)=[0x0]) io_submit(0x0, 0x0, &(0x7f0000000480)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x101000, 0x0) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000080)={0x8, "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"}) openat(0xffffffffffffff9c, 0x0, 0x4000, 0x8) io_submit(0x0, 0x4, &(0x7f00000015c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x6, 0x0, 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xda, 0x0, 0x5}, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x2, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x1, 0xfc1, r1, &(0x7f0000001540)="3b719c848dbbfc9de7", 0x9, 0x7, 0x0, 0x5}]) 11:47:39 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX, @ANYBLOB='d']) 11:47:39 executing program 6: socket$inet6_icmp(0xa, 0x2, 0x11) 11:47:39 executing program 4: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000580)) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCGETA(r0, 0x5609, 0x0) 11:47:39 executing program 6: socket$inet6_icmp(0xa, 0x2, 0x11) 11:47:39 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="001101000751"], 0x90) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, 0x0, 0x0) [ 120.704052] sg_write: data in/out 524252/251 bytes for SCSI command 0x0-- guessing data in; [ 120.704052] program syz-executor.0 not setting count and/or reply_len properly 11:47:39 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX, @ANYBLOB='d']) 11:47:39 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="001101000751"], 0x90) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, 0x0, 0x0) 11:47:39 executing program 4: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000580)) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCGETA(r0, 0x5609, 0x0) [ 120.787894] tmpfs: Bad value for 'gid' 11:47:39 executing program 2: chdir(&(0x7f00000000c0)='./file0\x00') io_setup(0x6, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000080)={0x200017e}) io_submit(0x0, 0x1, &(0x7f0000000480)=[0x0]) io_submit(0x0, 0x0, &(0x7f0000000480)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x101000, 0x0) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000080)={0x8, "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"}) openat(0xffffffffffffff9c, 0x0, 0x4000, 0x8) io_submit(0x0, 0x4, &(0x7f00000015c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x6, 0x0, 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xda, 0x0, 0x5}, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x2, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x1, 0xfc1, r1, &(0x7f0000001540)="3b719c848dbbfc9de7", 0x9, 0x7, 0x0, 0x5}]) 11:47:39 executing program 3: chdir(&(0x7f00000000c0)='./file0\x00') io_setup(0x6, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000080)={0x200017e}) io_submit(0x0, 0x1, &(0x7f0000000480)=[0x0]) io_submit(0x0, 0x0, &(0x7f0000000480)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x101000, 0x0) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000080)={0x8, "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"}) openat(0xffffffffffffff9c, 0x0, 0x4000, 0x8) io_submit(0x0, 0x4, &(0x7f00000015c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x6, 0x0, 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xda, 0x0, 0x5}, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x2, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x1, 0xfc1, r1, &(0x7f0000001540)="3b719c848dbbfc9de7", 0x9, 0x7, 0x0, 0x5}]) 11:47:39 executing program 1: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) pwritev(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)="e1", 0x1}], 0x1, 0x5, 0x0) 11:47:40 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX, @ANYBLOB='d']) 11:47:40 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0xb, &(0x7f0000000200)=0x5, 0x4) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)={{0x14}, [@NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x506}], {0x14}}, 0x3c}}, 0x0) 11:47:40 executing program 7: r0 = syz_io_uring_setup(0x1, &(0x7f0000000000)={0x0, 0x0, 0x1}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000200)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_READV=@use_registered_buffer, 0x0) io_uring_enter(r0, 0x1, 0x0, 0xf, 0x0, 0x18) 11:47:40 executing program 3: chdir(&(0x7f00000000c0)='./file0\x00') io_setup(0x6, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000080)={0x200017e}) io_submit(0x0, 0x1, &(0x7f0000000480)=[0x0]) io_submit(0x0, 0x0, &(0x7f0000000480)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x101000, 0x0) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000080)={0x8, "6a773a3bdbac8186e3b51767236921477419eebf76908fd01b1a31c6635a4e8999c5cbf9f65aabe0bab3488460a815da22ad7764274b0255af6d0c2c35d129810e819a27b8fadff5c649822666c676ec3cb01c52ec8b6a6262103289d5ddd6b053ac9edcf7846a93967b2ae25ef56446ebcb4f08994ea59070b6a46121c84fe34a80d0301c423354b7c062e20d55f8cdacfca8efc2c5749657ff559e319510aa6438102b430e4a15aafbcc434fe695171dbb875d81ef8e59eeb9b0844228b76c00dbc9988b22f4e4fcf6befd8e659fcef464572e5fb894b3b2c36861a7e9719115146b7af0da01530c9ac471287c1e21a8b412f740f88ce6e7abff873ed8551fd5d002eb132bdbf93bc711b6512afe0f0d23a366ef5b198da8cf1b0eb0df14f3804c406549d00d7895fbf8f81b29102f5b5a34cccce2b2a1d62cfbb1e0ee5b5845d2b9b0c31845944df1789ab51b8cb1e3f60e974a4d6065a0ace42a555a42ef1f289ed822f5d78b04a51d6c056b0ad7d12fa7cade6fd5730855821bfd0abb6b2b33838c431eb27bbd784840157e565ad1923f5d92c1256f8dbf0b452997f4940af64455b4ae2c2d02a657a83a840ac531bd6c2f89401fd1f442f43691d1b4533efa74affd18fb1f2c331430597be3c40c6bd58e375626e80218657dd659e156f17887c80825554430811d2974b9b1e021e2dbdd254c3435aeee66f7f0722995"}) openat(0xffffffffffffff9c, 0x0, 0x4000, 0x8) io_submit(0x0, 0x4, &(0x7f00000015c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x6, 0x0, 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xda, 0x0, 0x5}, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x2, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x1, 0xfc1, r1, &(0x7f0000001540)="3b719c848dbbfc9de7", 0x9, 0x7, 0x0, 0x5}]) 11:47:40 executing program 1: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) pwritev(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)="e1", 0x1}], 0x1, 0x5, 0x0) 11:47:40 executing program 4: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000580)) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCGETA(r0, 0x5609, 0x0) 11:47:40 executing program 2: chdir(&(0x7f00000000c0)='./file0\x00') io_setup(0x6, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000080)={0x200017e}) io_submit(0x0, 0x1, &(0x7f0000000480)=[0x0]) io_submit(0x0, 0x0, &(0x7f0000000480)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x101000, 0x0) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000080)={0x8, "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"}) openat(0xffffffffffffff9c, 0x0, 0x4000, 0x8) io_submit(0x0, 0x4, &(0x7f00000015c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x6, 0x0, 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xda, 0x0, 0x5}, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x2, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x1, 0xfc1, r1, &(0x7f0000001540)="3b719c848dbbfc9de7", 0x9, 0x7, 0x0, 0x5}]) [ 120.952196] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=4083 comm=syz-executor.6 [ 120.953448] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=4083 comm=syz-executor.6 11:47:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000001c0), 0x4) [ 120.966860] tmpfs: Bad value for 'gid' [ 120.976192] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=4096 comm=syz-executor.6 [ 120.977173] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=4096 comm=syz-executor.6 11:47:40 executing program 1: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) pwritev(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)="e1", 0x1}], 0x1, 0x5, 0x0) 11:47:40 executing program 4: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000580)) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCGETA(r0, 0x5609, 0x0) 11:47:40 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0xb, &(0x7f0000000200)=0x5, 0x4) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)={{0x14}, [@NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x506}], {0x14}}, 0x3c}}, 0x0) [ 121.044032] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=4103 comm=syz-executor.6 [ 121.045102] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=4103 comm=syz-executor.6 11:47:40 executing program 3: chdir(&(0x7f00000000c0)='./file0\x00') io_setup(0x6, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000080)={0x200017e}) io_submit(0x0, 0x1, &(0x7f0000000480)=[0x0]) io_submit(0x0, 0x0, &(0x7f0000000480)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x101000, 0x0) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000080)={0x8, "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"}) openat(0xffffffffffffff9c, 0x0, 0x4000, 0x8) io_submit(0x0, 0x4, &(0x7f00000015c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x6, 0x0, 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xda, 0x0, 0x5}, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x2, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x1, 0xfc1, r1, &(0x7f0000001540)="3b719c848dbbfc9de7", 0x9, 0x7, 0x0, 0x5}]) 11:47:40 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0xb, &(0x7f0000000200)=0x5, 0x4) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)={{0x14}, [@NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x506}], {0x14}}, 0x3c}}, 0x0) 11:47:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000001c0), 0x4) 11:47:40 executing program 7: r0 = syz_io_uring_setup(0x1, &(0x7f0000000000)={0x0, 0x0, 0x1}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000200)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_READV=@use_registered_buffer, 0x0) io_uring_enter(r0, 0x1, 0x0, 0xf, 0x0, 0x18) 11:47:40 executing program 2: chdir(&(0x7f00000000c0)='./file0\x00') io_setup(0x6, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000080)={0x200017e}) io_submit(0x0, 0x1, &(0x7f0000000480)=[0x0]) io_submit(0x0, 0x0, &(0x7f0000000480)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x101000, 0x0) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000080)={0x8, "6a773a3bdbac8186e3b51767236921477419eebf76908fd01b1a31c6635a4e8999c5cbf9f65aabe0bab3488460a815da22ad7764274b0255af6d0c2c35d129810e819a27b8fadff5c649822666c676ec3cb01c52ec8b6a6262103289d5ddd6b053ac9edcf7846a93967b2ae25ef56446ebcb4f08994ea59070b6a46121c84fe34a80d0301c423354b7c062e20d55f8cdacfca8efc2c5749657ff559e319510aa6438102b430e4a15aafbcc434fe695171dbb875d81ef8e59eeb9b0844228b76c00dbc9988b22f4e4fcf6befd8e659fcef464572e5fb894b3b2c36861a7e9719115146b7af0da01530c9ac471287c1e21a8b412f740f88ce6e7abff873ed8551fd5d002eb132bdbf93bc711b6512afe0f0d23a366ef5b198da8cf1b0eb0df14f3804c406549d00d7895fbf8f81b29102f5b5a34cccce2b2a1d62cfbb1e0ee5b5845d2b9b0c31845944df1789ab51b8cb1e3f60e974a4d6065a0ace42a555a42ef1f289ed822f5d78b04a51d6c056b0ad7d12fa7cade6fd5730855821bfd0abb6b2b33838c431eb27bbd784840157e565ad1923f5d92c1256f8dbf0b452997f4940af64455b4ae2c2d02a657a83a840ac531bd6c2f89401fd1f442f43691d1b4533efa74affd18fb1f2c331430597be3c40c6bd58e375626e80218657dd659e156f17887c80825554430811d2974b9b1e021e2dbdd254c3435aeee66f7f0722995"}) openat(0xffffffffffffff9c, 0x0, 0x4000, 0x8) io_submit(0x0, 0x4, &(0x7f00000015c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x6, 0x0, 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xda, 0x0, 0x5}, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x2, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x1, 0xfc1, r1, &(0x7f0000001540)="3b719c848dbbfc9de7", 0x9, 0x7, 0x0, 0x5}]) 11:47:40 executing program 1: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) pwritev(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)="e1", 0x1}], 0x1, 0x5, 0x0) 11:47:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0xb, &(0x7f0000000200)=0x5, 0x4) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)={{0x14}, [@NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x506}], {0x14}}, 0x3c}}, 0x0) 11:47:40 executing program 5: ioprio_get$pid(0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 121.169925] loop5: detected capacity change from 0 to 256 [ 121.189933] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 121.234127] hrtimer: interrupt took 19427 ns 11:47:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000001c0), 0x4) 11:47:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0xb, &(0x7f0000000200)=0x5, 0x4) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)={{0x14}, [@NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x506}], {0x14}}, 0x3c}}, 0x0) 11:47:40 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0xb, &(0x7f0000000200)=0x5, 0x4) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)={{0x14}, [@NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x506}], {0x14}}, 0x3c}}, 0x0) 11:47:40 executing program 7: r0 = syz_io_uring_setup(0x1, &(0x7f0000000000)={0x0, 0x0, 0x1}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000200)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_READV=@use_registered_buffer, 0x0) io_uring_enter(r0, 0x1, 0x0, 0xf, 0x0, 0x18) 11:47:40 executing program 3: r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, 0x0) 11:47:40 executing program 5: ioprio_get$pid(0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 11:47:40 executing program 2: ioprio_get$pid(0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 11:47:40 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x49, &(0x7f0000000200)={0x77359400}, 0x10) 11:47:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0xb, &(0x7f0000000200)=0x5, 0x4) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)={{0x14}, [@NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x506}], {0x14}}, 0x3c}}, 0x0) 11:47:40 executing program 3: sched_rr_get_interval(0x0, &(0x7f0000001c00)) 11:47:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000001c0), 0x4) 11:47:40 executing program 7: r0 = syz_io_uring_setup(0x1, &(0x7f0000000000)={0x0, 0x0, 0x1}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000200)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_READV=@use_registered_buffer, 0x0) io_uring_enter(r0, 0x1, 0x0, 0xf, 0x0, 0x18) [ 121.481262] loop2: detected capacity change from 0 to 256 [ 121.560246] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:47:40 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x49, &(0x7f0000000200)={0x77359400}, 0x10) 11:47:40 executing program 3: write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="68000000290000000000000000000000000000000000000000000000000007002e2f66361a9fc915e4783100000000000000000000000000000000000007002e2f66696c653000000000000000000000000000b4e9"], 0x68) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x40, &(0x7f0000000080)={@rand_addr, @remote}, 0xc) 11:47:40 executing program 6: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f00000007c0)={'sit0\x00'}) 11:47:40 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000001880)=[{&(0x7f0000000000)="9b5dce948015929cd842a727343eaa90bec39197ffedbabd88d9857e08d7a3bce4084e2cbd7f93ad23f9dd94ddeb70a2a70ee72e7ec74d6d94025a150828376d9bf7dcaef13327a480158d190e7af5281fa95d25ffdd0c0aad982e9b6d", 0x5d}], 0x1) 11:47:40 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000680), r0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000006c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 11:47:40 executing program 0: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x185000, 0x0) 11:47:40 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000001880)=[{&(0x7f0000000000)="9b5dce948015929cd842a727343eaa90bec39197ffedbabd88d9857e08d7a3bce4084e2cbd7f93ad23f9dd94ddeb70a2a70ee72e7ec74d6d94025a150828376d9bf7dcaef13327a480158d190e7af5281fa95d25ffdd0c0aad982e9b6d", 0x5d}], 0x1) 11:47:40 executing program 6: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f00000007c0)={'sit0\x00'}) 11:47:40 executing program 2: ioprio_get$pid(0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 121.783023] loop5: detected capacity change from 0 to 256 [ 121.789929] loop2: detected capacity change from 0 to 256 [ 121.828787] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 121.883188] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:47:41 executing program 3: write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="68000000290000000000000000000000000000000000000000000000000007002e2f66361a9fc915e4783100000000000000000000000000000000000007002e2f66696c653000000000000000000000000000b4e9"], 0x68) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x40, &(0x7f0000000080)={@rand_addr, @remote}, 0xc) 11:47:41 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x49, &(0x7f0000000200)={0x77359400}, 0x10) 11:47:41 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000002c0), 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000380)="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", 0xc81) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000001600)) 11:47:41 executing program 5: ioprio_get$pid(0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 11:47:41 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000680), r0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000006c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 11:47:41 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000001880)=[{&(0x7f0000000000)="9b5dce948015929cd842a727343eaa90bec39197ffedbabd88d9857e08d7a3bce4084e2cbd7f93ad23f9dd94ddeb70a2a70ee72e7ec74d6d94025a150828376d9bf7dcaef13327a480158d190e7af5281fa95d25ffdd0c0aad982e9b6d", 0x5d}], 0x1) 11:47:41 executing program 2: ioprio_get$pid(0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 11:47:41 executing program 6: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f00000007c0)={'sit0\x00'}) [ 122.028807] loop2: detected capacity change from 0 to 256 11:47:41 executing program 6: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f00000007c0)={'sit0\x00'}) 11:47:41 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000001880)=[{&(0x7f0000000000)="9b5dce948015929cd842a727343eaa90bec39197ffedbabd88d9857e08d7a3bce4084e2cbd7f93ad23f9dd94ddeb70a2a70ee72e7ec74d6d94025a150828376d9bf7dcaef13327a480158d190e7af5281fa95d25ffdd0c0aad982e9b6d", 0x5d}], 0x1) 11:47:41 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000680), r0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000006c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 11:47:41 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000680), r0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000006c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 11:47:41 executing program 3: write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="68000000290000000000000000000000000000000000000000000000000007002e2f66361a9fc915e4783100000000000000000000000000000000000007002e2f66696c653000000000000000000000000000b4e9"], 0x68) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x40, &(0x7f0000000080)={@rand_addr, @remote}, 0xc) [ 122.123965] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:47:41 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x49, &(0x7f0000000200)={0x77359400}, 0x10) [ 122.462366] loop5: detected capacity change from 0 to 256 [ 123.119750] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 11:47:44 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r0, 0x5413, &(0x7f0000000380)=""/98) 11:47:44 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000680), r0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000006c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 11:47:44 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000680), r0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000006c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 11:47:44 executing program 4: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) write$selinux_attr(r0, 0x0, 0x0) 11:47:44 executing program 2: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f0000000c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x810) syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:47:44 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000004c0)={0x0, r1, 0x8, 0x9, 0x1, 0x101}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(r1, &(0x7f0000000480)='./file1\x00', 0xc8002, 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000400)={[{@rodir}, {@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000340)) 11:47:44 executing program 3: write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="68000000290000000000000000000000000000000000000000000000000007002e2f66361a9fc915e4783100000000000000000000000000000000000007002e2f66696c653000000000000000000000000000b4e9"], 0x68) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x40, &(0x7f0000000080)={@rand_addr, @remote}, 0xc) 11:47:44 executing program 5: ioprio_get$pid(0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 125.036271] loop5: detected capacity change from 0 to 256 11:47:44 executing program 4: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) write$selinux_attr(r0, 0x0, 0x0) 11:47:44 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r0, 0x5413, &(0x7f0000000380)=""/98) 11:47:44 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000680), r0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000006c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 11:47:44 executing program 2: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f0000000c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x810) syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 125.066702] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 125.072532] loop6: detected capacity change from 0 to 27 [ 125.073763] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 11:47:44 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) syncfs(r0) 11:47:44 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000000c40), 0x4) 11:47:44 executing program 4: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) write$selinux_attr(r0, 0x0, 0x0) 11:47:44 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r0, 0x5413, &(0x7f0000000380)=""/98) 11:47:44 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000180), 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000e80)=""/113) 11:47:45 executing program 2: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f0000000c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x810) syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 125.857881] loop6: detected capacity change from 0 to 27 11:47:45 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r0, 0x5413, &(0x7f0000000380)=""/98) [ 125.871101] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 11:47:45 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000004c0)={0x0, r1, 0x8, 0x9, 0x1, 0x101}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(r1, &(0x7f0000000480)='./file1\x00', 0xc8002, 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000400)={[{@rodir}, {@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000340)) 11:47:45 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000000c40), 0x4) 11:47:45 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) syncfs(r0) 11:47:45 executing program 4: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) write$selinux_attr(r0, 0x0, 0x0) 11:47:45 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000004c0)={0x0, r1, 0x8, 0x9, 0x1, 0x101}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(r1, &(0x7f0000000480)='./file1\x00', 0xc8002, 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000400)={[{@rodir}, {@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000340)) 11:47:45 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000180), 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000e80)=""/113) 11:47:45 executing program 2: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f0000000c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x810) syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:47:45 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000000c40), 0x4) [ 126.077237] loop1: detected capacity change from 0 to 27 11:47:45 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000180), 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000e80)=""/113) 11:47:45 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) syncfs(r0) [ 126.087509] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 11:47:45 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000004c0)={0x0, r1, 0x8, 0x9, 0x1, 0x101}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(r1, &(0x7f0000000480)='./file1\x00', 0xc8002, 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000400)={[{@rodir}, {@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000340)) 11:47:45 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000004c0)={0x0, r1, 0x8, 0x9, 0x1, 0x101}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(r1, &(0x7f0000000480)='./file1\x00', 0xc8002, 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000400)={[{@rodir}, {@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000340)) 11:47:45 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000004c0)={0x0, r1, 0x8, 0x9, 0x1, 0x101}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(r1, &(0x7f0000000480)='./file1\x00', 0xc8002, 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000400)={[{@rodir}, {@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000340)) 11:47:45 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) syncfs(r0) [ 126.261081] loop6: detected capacity change from 0 to 27 11:47:45 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000180), 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000e80)=""/113) [ 126.291538] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 126.325856] loop2: detected capacity change from 0 to 27 [ 126.341279] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 126.353786] loop0: detected capacity change from 0 to 27 [ 126.355596] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 126.432719] loop4: detected capacity change from 0 to 27 [ 126.454098] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 11:47:45 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000000c40), 0x4) 11:47:45 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000004c0)={0x0, r1, 0x8, 0x9, 0x1, 0x101}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(r1, &(0x7f0000000480)='./file1\x00', 0xc8002, 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000400)={[{@rodir}, {@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000340)) 11:47:45 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000004c0)={0x0, r1, 0x8, 0x9, 0x1, 0x101}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(r1, &(0x7f0000000480)='./file1\x00', 0xc8002, 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000400)={[{@rodir}, {@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000340)) 11:47:45 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000004c0)={0x0, r1, 0x8, 0x9, 0x1, 0x101}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(r1, &(0x7f0000000480)='./file1\x00', 0xc8002, 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000400)={[{@rodir}, {@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000340)) 11:47:45 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000004c0)={0x0, r1, 0x8, 0x9, 0x1, 0x101}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(r1, &(0x7f0000000480)='./file1\x00', 0xc8002, 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000400)={[{@rodir}, {@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000340)) 11:47:45 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000004c0)={0x0, r1, 0x8, 0x9, 0x1, 0x101}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(r1, &(0x7f0000000480)='./file1\x00', 0xc8002, 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000400)={[{@rodir}, {@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000340)) 11:47:45 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000004c0)={0x0, r1, 0x8, 0x9, 0x1, 0x101}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(r1, &(0x7f0000000480)='./file1\x00', 0xc8002, 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000400)={[{@rodir}, {@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000340)) 11:47:45 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000004c0)={0x0, r1, 0x8, 0x9, 0x1, 0x101}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(r1, &(0x7f0000000480)='./file1\x00', 0xc8002, 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000400)={[{@rodir}, {@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000340)) 11:47:45 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000004c0)={0x0, r1, 0x8, 0x9, 0x1, 0x101}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(r1, &(0x7f0000000480)='./file1\x00', 0xc8002, 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000400)={[{@rodir}, {@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000340)) [ 126.752084] loop0: detected capacity change from 0 to 27 [ 126.754172] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 126.766279] loop6: detected capacity change from 0 to 27 [ 126.773326] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 126.783422] loop1: detected capacity change from 0 to 27 [ 126.784357] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 126.883603] loop4: detected capacity change from 0 to 27 [ 126.884583] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 11:47:46 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000004c0)={0x0, r1, 0x8, 0x9, 0x1, 0x101}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(r1, &(0x7f0000000480)='./file1\x00', 0xc8002, 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000400)={[{@rodir}, {@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000340)) [ 127.042613] loop5: detected capacity change from 0 to 27 [ 127.049215] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 127.094852] loop2: detected capacity change from 0 to 27 [ 127.108129] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 127.127861] loop3: detected capacity change from 0 to 27 [ 127.128654] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 127.136100] loop7: detected capacity change from 0 to 27 [ 127.136904] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 11:47:46 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000004c0)={0x0, r1, 0x8, 0x9, 0x1, 0x101}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(r1, &(0x7f0000000480)='./file1\x00', 0xc8002, 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000400)={[{@rodir}, {@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000340)) 11:47:46 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000004c0)={0x0, r1, 0x8, 0x9, 0x1, 0x101}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(r1, &(0x7f0000000480)='./file1\x00', 0xc8002, 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000400)={[{@rodir}, {@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000340)) [ 127.286935] loop6: detected capacity change from 0 to 27 [ 127.287781] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 11:47:46 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000004c0)={0x0, r1, 0x8, 0x9, 0x1, 0x101}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(r1, &(0x7f0000000480)='./file1\x00', 0xc8002, 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000400)={[{@rodir}, {@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000340)) 11:47:46 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000004c0)={0x0, r1, 0x8, 0x9, 0x1, 0x101}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(r1, &(0x7f0000000480)='./file1\x00', 0xc8002, 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000400)={[{@rodir}, {@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000340)) 11:47:46 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000004c0)={0x0, r1, 0x8, 0x9, 0x1, 0x101}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(r1, &(0x7f0000000480)='./file1\x00', 0xc8002, 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000400)={[{@rodir}, {@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000340)) 11:47:46 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000004c0)={0x0, r1, 0x8, 0x9, 0x1, 0x101}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(r1, &(0x7f0000000480)='./file1\x00', 0xc8002, 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000400)={[{@rodir}, {@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000340)) 11:47:46 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000004c0)={0x0, r1, 0x8, 0x9, 0x1, 0x101}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(r1, &(0x7f0000000480)='./file1\x00', 0xc8002, 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000400)={[{@rodir}, {@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000340)) [ 127.433571] loop4: detected capacity change from 0 to 27 [ 127.434348] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 127.444638] loop2: detected capacity change from 0 to 27 [ 127.450749] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 127.599604] loop6: detected capacity change from 0 to 27 [ 127.600288] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 127.602780] loop1: detected capacity change from 0 to 27 [ 127.612881] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 127.634256] loop7: detected capacity change from 0 to 27 [ 127.635906] loop5: detected capacity change from 0 to 27 [ 127.639787] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 127.641379] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 127.676057] loop0: detected capacity change from 0 to 27 [ 127.678716] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 11:47:47 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000004c0)={0x0, r1, 0x8, 0x9, 0x1, 0x101}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(r1, &(0x7f0000000480)='./file1\x00', 0xc8002, 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000400)={[{@rodir}, {@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000340)) 11:47:47 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) syncfs(r0) 11:47:47 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000004c0)={0x0, r1, 0x8, 0x9, 0x1, 0x101}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(r1, &(0x7f0000000480)='./file1\x00', 0xc8002, 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66aa541ae9a5f42fefb047436d6c2416285793361f23ace0e3666e47dac410a1047a20710ad0bc8781024d37ef2e3456ac7178fd2ea26d75d963423678b55bee32c0fc2696cb52f45a60b8e3635a982bbc6f643c54cfc4212fd717170f75e6fe08c5e2d007e43209704cc1e15c14da4db99a8a00e75", 0x89, 0x8}, {&(0x7f0000000300)="adbf3a6c6f8ced403e4d167f1835f0831b4a1878501e444d3fc569adb2d8dd01585c75b45e2624610b7f", 0x2a, 0xe9}], 0x200480c, &(0x7f0000000400)={[{@rodir}, {@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000340)) 11:47:47 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000004c0)={0x0, r1, 0x8, 0x9, 0x1, 0x101}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(r1, &(0x7f0000000480)='./file1\x00', 0xc8002, 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x3, &(0x7f0000000380)=[{&(0x7f0000000180)="1c2fe7f4768bbb4726372f7ae4f19dbebc055e338ef75483d768ff9661c6", 0x1e, 0x84a}, {&(0x7f00000001c0)="388cbf3d90953f6ab40ff6a75acbbf53880ed5b66 VM DIAGNOSIS: 11:47:38 Registers: info registers vcpu 0 RAX=0000000000000029 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b29f1 RDI=ffffffff87641ba0 RBP=ffffffff87641b60 RSP=ffff88801e1ff698 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000029 R11=0000000000000001 R12=0000000000000029 R13=ffffffff87641b60 R14=0000000000000010 R15=ffffffff822b29e0 RIP=ffffffff822b2a49 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f36ad162700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000055b2e87aa080 CR3=000000001765a000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f36afcd37c0 00007f36afcd37c8 YMM02=0000000000000000 0000000000000000 00007f36afcd37e0 00007f36afcd37c0 YMM03=0000000000000000 0000000000000000 00007f36afcd37c8 00007f36afcd37c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000001 RBX=ffff88806cf3d600 RCX=ffffffff812aac20 RDX=1ffff1100d9e7ac2 RSI=0000000000000004 RDI=ffff88806cf3d610 RBP=ffff88807ffdc980 RSP=ffff88803e7c7888 R8 =0000000000000001 R9 =ffff88803e7c782b R10=ffffed1007cf8f05 R11=0000000000000001 R12=ffff88806cf3d600 R13=dffffc0000000000 R14=000000000000069b R15=ffff88807ffdc500 RIP=ffffffff84263928 RFL=00000082 [--S----] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0000 0000000000000000 00000000 00000000 DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f4013280e08 CR3=000000001b65c000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 6461657268747062 696c2f756e672d78 YMM02=0000000000000000 0000000000000000 00302e6f732e6461 657268747062696c YMM03=0000000000000000 0000000000000000 2f756e672d78756e 696c2d34365f3638 YMM04=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000