Warning: Permanently added '[localhost]:31078' (ECDSA) to the list of known hosts. 2022/09/16 12:14:27 fuzzer started 2022/09/16 12:14:27 dialing manager at localhost:36051 syzkaller login: [ 43.543310] cgroup: Unknown subsys name 'net' [ 43.645430] cgroup: Unknown subsys name 'rlimit' 2022/09/16 12:14:39 syscalls: 2215 2022/09/16 12:14:39 code coverage: enabled 2022/09/16 12:14:39 comparison tracing: enabled 2022/09/16 12:14:39 extra coverage: enabled 2022/09/16 12:14:39 setuid sandbox: enabled 2022/09/16 12:14:39 namespace sandbox: enabled 2022/09/16 12:14:39 Android sandbox: enabled 2022/09/16 12:14:39 fault injection: enabled 2022/09/16 12:14:39 leak checking: enabled 2022/09/16 12:14:39 net packet injection: enabled 2022/09/16 12:14:39 net device setup: enabled 2022/09/16 12:14:39 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/16 12:14:39 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/16 12:14:39 USB emulation: enabled 2022/09/16 12:14:39 hci packet injection: enabled 2022/09/16 12:14:39 wifi device emulation: failed to parse kernel version (6.0.0-rc5-next-20220916) 2022/09/16 12:14:39 802.15.4 emulation: enabled 2022/09/16 12:14:39 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/16 12:14:40 fetching corpus: 50, signal 31141/34510 (executing program) 2022/09/16 12:14:40 fetching corpus: 100, signal 42985/47683 (executing program) 2022/09/16 12:14:40 fetching corpus: 150, signal 51265/57190 (executing program) 2022/09/16 12:14:40 fetching corpus: 200, signal 60812/67734 (executing program) 2022/09/16 12:14:40 fetching corpus: 250, signal 67100/75048 (executing program) 2022/09/16 12:14:40 fetching corpus: 300, signal 72600/81505 (executing program) 2022/09/16 12:14:40 fetching corpus: 350, signal 77260/87122 (executing program) 2022/09/16 12:14:41 fetching corpus: 400, signal 79920/90766 (executing program) 2022/09/16 12:14:41 fetching corpus: 450, signal 83758/95388 (executing program) 2022/09/16 12:14:41 fetching corpus: 500, signal 87916/100260 (executing program) 2022/09/16 12:14:41 fetching corpus: 550, signal 90634/103788 (executing program) 2022/09/16 12:14:41 fetching corpus: 600, signal 94880/108596 (executing program) 2022/09/16 12:14:41 fetching corpus: 650, signal 97143/111601 (executing program) 2022/09/16 12:14:41 fetching corpus: 700, signal 99710/114806 (executing program) 2022/09/16 12:14:42 fetching corpus: 750, signal 103112/118647 (executing program) 2022/09/16 12:14:42 fetching corpus: 800, signal 107165/123011 (executing program) 2022/09/16 12:14:42 fetching corpus: 850, signal 109389/125814 (executing program) 2022/09/16 12:14:42 fetching corpus: 900, signal 112017/128845 (executing program) 2022/09/16 12:14:42 fetching corpus: 950, signal 114138/131400 (executing program) 2022/09/16 12:14:42 fetching corpus: 1000, signal 115830/133639 (executing program) 2022/09/16 12:14:42 fetching corpus: 1050, signal 117576/135893 (executing program) 2022/09/16 12:14:43 fetching corpus: 1100, signal 120348/138883 (executing program) 2022/09/16 12:14:43 fetching corpus: 1150, signal 121858/140874 (executing program) 2022/09/16 12:14:43 fetching corpus: 1200, signal 124981/144049 (executing program) 2022/09/16 12:14:43 fetching corpus: 1250, signal 127192/146439 (executing program) 2022/09/16 12:14:43 fetching corpus: 1300, signal 128393/148081 (executing program) 2022/09/16 12:14:43 fetching corpus: 1350, signal 129373/149508 (executing program) 2022/09/16 12:14:43 fetching corpus: 1400, signal 130521/151028 (executing program) 2022/09/16 12:14:43 fetching corpus: 1450, signal 131664/152541 (executing program) 2022/09/16 12:14:43 fetching corpus: 1500, signal 133645/154593 (executing program) 2022/09/16 12:14:44 fetching corpus: 1550, signal 135579/156554 (executing program) 2022/09/16 12:14:44 fetching corpus: 1600, signal 137091/158237 (executing program) 2022/09/16 12:14:44 fetching corpus: 1650, signal 139508/160459 (executing program) 2022/09/16 12:14:44 fetching corpus: 1700, signal 140675/161791 (executing program) 2022/09/16 12:14:44 fetching corpus: 1750, signal 142695/163668 (executing program) 2022/09/16 12:14:44 fetching corpus: 1800, signal 144185/165136 (executing program) 2022/09/16 12:14:45 fetching corpus: 1850, signal 145693/166644 (executing program) 2022/09/16 12:14:45 fetching corpus: 1900, signal 146514/167690 (executing program) 2022/09/16 12:14:45 fetching corpus: 1950, signal 148508/169555 (executing program) 2022/09/16 12:14:45 fetching corpus: 2000, signal 149939/170911 (executing program) 2022/09/16 12:14:45 fetching corpus: 2050, signal 151790/172505 (executing program) 2022/09/16 12:14:45 fetching corpus: 2100, signal 152921/173650 (executing program) 2022/09/16 12:14:45 fetching corpus: 2150, signal 154624/175122 (executing program) 2022/09/16 12:14:46 fetching corpus: 2200, signal 155911/176322 (executing program) 2022/09/16 12:14:46 fetching corpus: 2250, signal 156967/177369 (executing program) 2022/09/16 12:14:46 fetching corpus: 2300, signal 157671/178203 (executing program) 2022/09/16 12:14:46 fetching corpus: 2350, signal 158655/179116 (executing program) 2022/09/16 12:14:46 fetching corpus: 2400, signal 159645/180101 (executing program) 2022/09/16 12:14:46 fetching corpus: 2450, signal 160721/181104 (executing program) 2022/09/16 12:14:46 fetching corpus: 2500, signal 162005/182227 (executing program) 2022/09/16 12:14:46 fetching corpus: 2550, signal 163624/183420 (executing program) 2022/09/16 12:14:47 fetching corpus: 2600, signal 164800/184577 (executing program) 2022/09/16 12:14:47 fetching corpus: 2650, signal 165736/185365 (executing program) 2022/09/16 12:14:47 fetching corpus: 2700, signal 166708/186240 (executing program) 2022/09/16 12:14:47 fetching corpus: 2750, signal 168260/187313 (executing program) 2022/09/16 12:14:47 fetching corpus: 2800, signal 169987/188644 (executing program) 2022/09/16 12:14:47 fetching corpus: 2850, signal 171371/189524 (executing program) 2022/09/16 12:14:47 fetching corpus: 2900, signal 172375/190298 (executing program) 2022/09/16 12:14:48 fetching corpus: 2950, signal 173308/191013 (executing program) 2022/09/16 12:14:48 fetching corpus: 3000, signal 174223/191721 (executing program) 2022/09/16 12:14:48 fetching corpus: 3050, signal 175520/192501 (executing program) 2022/09/16 12:14:48 fetching corpus: 3100, signal 176387/193089 (executing program) 2022/09/16 12:14:48 fetching corpus: 3150, signal 177986/193996 (executing program) 2022/09/16 12:14:48 fetching corpus: 3200, signal 178868/194555 (executing program) 2022/09/16 12:14:48 fetching corpus: 3250, signal 179692/195086 (executing program) 2022/09/16 12:14:49 fetching corpus: 3300, signal 181140/195768 (executing program) 2022/09/16 12:14:49 fetching corpus: 3350, signal 182054/196269 (executing program) 2022/09/16 12:14:49 fetching corpus: 3400, signal 182479/196611 (executing program) 2022/09/16 12:14:49 fetching corpus: 3450, signal 183484/197113 (executing program) 2022/09/16 12:14:49 fetching corpus: 3500, signal 184678/197641 (executing program) 2022/09/16 12:14:49 fetching corpus: 3550, signal 185511/198061 (executing program) 2022/09/16 12:14:49 fetching corpus: 3600, signal 186350/198474 (executing program) 2022/09/16 12:14:49 fetching corpus: 3650, signal 186856/198753 (executing program) 2022/09/16 12:14:50 fetching corpus: 3700, signal 188013/199205 (executing program) 2022/09/16 12:14:50 fetching corpus: 3750, signal 188759/199552 (executing program) 2022/09/16 12:14:50 fetching corpus: 3800, signal 189392/199852 (executing program) 2022/09/16 12:14:50 fetching corpus: 3850, signal 190334/200229 (executing program) 2022/09/16 12:14:50 fetching corpus: 3900, signal 192010/200673 (executing program) 2022/09/16 12:14:50 fetching corpus: 3950, signal 193224/201049 (executing program) 2022/09/16 12:14:51 fetching corpus: 4000, signal 193789/201258 (executing program) 2022/09/16 12:14:51 fetching corpus: 4050, signal 194610/201501 (executing program) 2022/09/16 12:14:51 fetching corpus: 4100, signal 195200/201683 (executing program) 2022/09/16 12:14:51 fetching corpus: 4150, signal 195727/201861 (executing program) 2022/09/16 12:14:51 fetching corpus: 4200, signal 196357/202035 (executing program) 2022/09/16 12:14:51 fetching corpus: 4250, signal 197262/202218 (executing program) 2022/09/16 12:14:51 fetching corpus: 4251, signal 197265/202279 (executing program) 2022/09/16 12:14:51 fetching corpus: 4251, signal 197265/202346 (executing program) 2022/09/16 12:14:51 fetching corpus: 4251, signal 197265/202391 (executing program) 2022/09/16 12:14:51 fetching corpus: 4251, signal 197265/202456 (executing program) 2022/09/16 12:14:51 fetching corpus: 4251, signal 197265/202515 (executing program) 2022/09/16 12:14:51 fetching corpus: 4251, signal 197265/202569 (executing program) 2022/09/16 12:14:51 fetching corpus: 4251, signal 197265/202631 (executing program) 2022/09/16 12:14:51 fetching corpus: 4251, signal 197265/202683 (executing program) 2022/09/16 12:14:51 fetching corpus: 4251, signal 197265/202754 (executing program) 2022/09/16 12:14:51 fetching corpus: 4251, signal 197265/202820 (executing program) 2022/09/16 12:14:51 fetching corpus: 4251, signal 197265/202872 (executing program) 2022/09/16 12:14:51 fetching corpus: 4251, signal 197265/202931 (executing program) 2022/09/16 12:14:51 fetching corpus: 4251, signal 197265/202937 (executing program) 2022/09/16 12:14:51 fetching corpus: 4251, signal 197265/202937 (executing program) 2022/09/16 12:14:54 starting 8 fuzzer processes 12:14:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000008540)={0x0, {{0x4, 0x0, @local}}}, 0x5000) 12:14:54 executing program 0: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 12:14:54 executing program 7: io_uring_setup(0x75c, &(0x7f0000000680)) 12:14:54 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000000)=0x3, 0x4) sendmmsg$sock(r0, &(0x7f00000038c0)=[{{&(0x7f00000036c0)=@in={0xa, 0x4e23, @local}, 0x80, 0x0}}], 0x1, 0x4c804) sendmmsg$inet6(r0, &(0x7f0000001500)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000240)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000380)="f23456cdf8dcdf7db792ad814a5cf50d472768038adb2abd9c2fbab92f01a1d2238f03ed64aa36d69764d8ed3fbb410c0d87a1a4bd7a0da7cfcae32d86dbd1dd63e0b5700fa6884dcd0119de", 0x4c}, {&(0x7f0000000400)="a24cf5473e3db9affd383fbf149cee47f6e70defda7be4740c28fea8f72cf7ed10af2881a340e35ed50a50d9b2a07374648b678f152622af297840a9bd640e87fb23af55fc8074fc02b646c6ecd5c6c972b80d3a99eaa3ab423981932ceec877a7a35164dc8960b6e44440bc8cff2753c379920319", 0x75}], 0x2}}], 0x2, 0x0) 12:14:54 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[@mss, @window={0x3, 0x101}], 0x366) 12:14:54 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000005140)=[{{&(0x7f0000000100)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000640)=[@rthdr_2292={{0x18}}], 0x18}}], 0x1, 0x0) 12:14:54 executing program 6: gettid() r0 = fork() ptrace$setopts(0x4200, r0, 0x80000000, 0x20) rt_tgsigqueueinfo(0x0, r0, 0x2c, &(0x7f0000000000)={0xa, 0x2, 0x7}) syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xf8, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r0}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}]}, 0xf8}, 0x1, 0x0, 0x0, 0x40080}, 0x40001) syz_genetlink_get_family_id$gtp(&(0x7f0000000440), 0xffffffffffffffff) sched_getparam(0x0, &(0x7f0000000680)) 12:14:54 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5f000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000be000000000000be000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c0000000000001c00080000000008007809140b2a3a08020000010000010100202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202073797a6b616c6c65722020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202047454e49534f494d4147452049534f20393636302f4846532046494c4553595354454d2043524541544f5220284329203139393320452e594f554e4744414c452028432920313939372d32303036204a2e50454152534f4e2f4a2e534348494c4c494e472028432920323030362d32303037204344524b4954205445414d202066696c6533202020202020202020202020202020202020202020202020202020202020202066696c6531202020202020202020202020202020202020202020202020202020202020202066696c6532202020202020202020202020202020202020202020202020202020202020202032303230303932303131343235383030083230323030393230313134323538303008303030303030303030303030303030300032303230303932303131343235383030080100202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202000"/1408, 0x580, 0x8000}, {&(0x7f0000010600)="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"/1408, 0x580, 0x8800}, {&(0x7f0000010c00)="ff43443030310100"/32, 0x20, 0x9000}, {&(0x7f0000010d00)="01001c0000000100000005001d000000010046494c4530000000000000000000", 0x20, 0xa000}, {&(0x7f0000010e00)="01000000001c0001000005000000001d000146494c4530000000000000000000", 0x20, 0xb000}, {&(0x7f0000010f00)="01001e000000010000000a001f000000010000660069006c0065003000000000", 0x20, 0xc000}, {&(0x7f0000011000)="01000000001e000100000a000000001f000100660069006c0065003000000000", 0x20, 0xd000}, {&(0x7f0000011100)="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"/288, 0x120, 0xe000}, {&(0x7f0000011300)="22001d0000000000001d00080000000008007809140b2a3a0802000001000001010022001c0000000000001c00080000000008007809140b2a3a080200000100000101012a0027000000000000271a0400000000041a7809140b2a3a08000000010000010846494c45302e3b3100"/128, 0x80, 0xe800}, {&(0x7f0000011400)="22001e0000000000001e00080000000008007809140b2a3a0802000001000001010022001e0000000000001e00080000000008007809140b2a3a080200000100000101013400200000000000002064000000000000647809140b2a3a08000000010000011200660069006c0065002e0063006f006c0064002c001f0000000000001f00080000000008007809140b2a3a08020000010000010a00660069006c00650030002c0021000000000000210a0000000000000a7809140b2a3a08000000010000010a00660069006c00650031002c00220000000000002228230000000023287809140b2a3a08000000010000010a00660069006c00650032002c00220000000000002228230000000023287809140b2a3a08000000010000010a00660069006c0065003300"/320, 0x140, 0xf000}, {&(0x7f0000011600)="22001f0000000000001f00080000000008007809140b2a3a0802000001000001010022001e0000000000001e00080000000008007809140b2a3a080200000100000101012c0027000000000000271a0400000000041a7809140b2a3a08000000010000010a00660069006c0065003000"/128, 0x80, 0xf800}, {&(0x7f0000011700)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x10000}, {&(0x7f0000011800)='syzkallers\x00'/32, 0x20, 0x10800}, {&(0x7f0000011900)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x13800}], 0x0, &(0x7f0000011e00)) [ 69.912209] audit: type=1400 audit(1663330494.303:6): avc: denied { execmem } for pid=285 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 71.163893] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 71.165866] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 71.167698] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 71.168979] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 71.170609] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 71.171865] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 71.175415] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 71.176669] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 71.178529] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 71.179305] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 71.181142] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 71.182703] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 71.187738] Bluetooth: hci0: HCI_REQ-0x0c1a [ 71.197390] Bluetooth: hci1: HCI_REQ-0x0c1a [ 71.266757] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 71.269060] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 71.294826] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 71.299391] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 71.313696] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 71.315135] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 71.320928] Bluetooth: hci3: HCI_REQ-0x0c1a [ 71.325737] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 71.327960] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 71.337372] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 71.339844] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 71.342075] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 71.343704] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 71.344850] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 71.346268] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 71.347737] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 71.349606] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 71.351646] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 71.353005] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 71.356321] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 71.374515] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 71.377202] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 71.378687] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 71.379803] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 71.385305] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 71.386858] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 71.389625] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 71.390763] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 71.391779] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 71.393979] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 71.395283] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 71.405602] Bluetooth: hci5: HCI_REQ-0x0c1a [ 71.412684] Bluetooth: hci7: HCI_REQ-0x0c1a [ 71.417009] Bluetooth: hci2: HCI_REQ-0x0c1a [ 71.450725] Bluetooth: hci6: HCI_REQ-0x0c1a [ 73.235052] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 73.235109] Bluetooth: hci1: command 0x0409 tx timeout [ 73.236411] Bluetooth: hci0: command 0x0409 tx timeout [ 73.362529] Bluetooth: hci3: command 0x0409 tx timeout [ 73.426536] Bluetooth: hci5: command 0x0409 tx timeout [ 73.490640] Bluetooth: hci6: command 0x0409 tx timeout [ 73.491530] Bluetooth: hci7: command 0x0409 tx timeout [ 73.492298] Bluetooth: hci2: command 0x0409 tx timeout [ 75.283537] Bluetooth: hci0: command 0x041b tx timeout [ 75.284037] Bluetooth: hci1: command 0x041b tx timeout [ 75.411530] Bluetooth: hci3: command 0x041b tx timeout [ 75.475541] Bluetooth: hci5: command 0x041b tx timeout [ 75.538568] Bluetooth: hci2: command 0x041b tx timeout [ 75.539179] Bluetooth: hci7: command 0x041b tx timeout [ 75.539690] Bluetooth: hci6: command 0x041b tx timeout [ 77.331518] Bluetooth: hci1: command 0x040f tx timeout [ 77.332054] Bluetooth: hci0: command 0x040f tx timeout [ 77.459579] Bluetooth: hci3: command 0x040f tx timeout [ 77.523517] Bluetooth: hci5: command 0x040f tx timeout [ 77.586532] Bluetooth: hci6: command 0x040f tx timeout [ 77.587098] Bluetooth: hci7: command 0x040f tx timeout [ 77.587816] Bluetooth: hci2: command 0x040f tx timeout [ 78.290790] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 79.378520] Bluetooth: hci0: command 0x0419 tx timeout [ 79.379046] Bluetooth: hci1: command 0x0419 tx timeout [ 79.507532] Bluetooth: hci3: command 0x0419 tx timeout [ 79.570564] Bluetooth: hci5: command 0x0419 tx timeout [ 79.635534] Bluetooth: hci2: command 0x0419 tx timeout [ 79.636018] Bluetooth: hci7: command 0x0419 tx timeout [ 79.636444] Bluetooth: hci6: command 0x0419 tx timeout [ 80.765068] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 80.769173] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 80.771810] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 80.774947] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 80.778764] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 80.781185] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 80.784957] Bluetooth: hci4: HCI_REQ-0x0c1a [ 82.834539] Bluetooth: hci4: command 0x0409 tx timeout [ 84.883568] Bluetooth: hci4: command 0x041b tx timeout [ 86.930577] Bluetooth: hci4: command 0x040f tx timeout [ 88.979534] Bluetooth: hci4: command 0x0419 tx timeout 12:15:47 executing program 0: r0 = fsopen(&(0x7f0000000000)='bdev\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x5, &(0x7f0000000040)='bdev\x00', &(0x7f0000000080)='bdev\x00', 0x0) 12:15:47 executing program 0: r0 = fsopen(&(0x7f0000000000)='bdev\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x5, &(0x7f0000000040)='bdev\x00', &(0x7f0000000080)='bdev\x00', 0x0) 12:15:47 executing program 0: r0 = fsopen(&(0x7f0000000000)='bdev\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x5, &(0x7f0000000040)='bdev\x00', &(0x7f0000000080)='bdev\x00', 0x0) 12:15:48 executing program 0: r0 = fsopen(&(0x7f0000000000)='bdev\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x5, &(0x7f0000000040)='bdev\x00', &(0x7f0000000080)='bdev\x00', 0x0) 12:15:48 executing program 0: r0 = fsopen(&(0x7f0000000000)='bdev\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x5, &(0x7f0000000040)='bdev\x00', &(0x7f0000000080)='bdev\x00', 0x0) 12:15:48 executing program 0: r0 = fsopen(&(0x7f0000000000)='bdev\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x5, &(0x7f0000000040)='bdev\x00', &(0x7f0000000080)='bdev\x00', 0x0) 12:15:48 executing program 0: r0 = fsopen(&(0x7f0000000000)='bdev\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x5, &(0x7f0000000040)='bdev\x00', &(0x7f0000000080)='bdev\x00', 0x0) 12:15:48 executing program 0: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="02c8003f00b8"], 0x17) syz_emit_vhci(&(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) [ 124.138860] Bluetooth: Unexpected start frame (len 18) [ 124.837447] loop1: detected capacity change from 0 to 760 12:15:53 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000008540)={0x0, {{0x4, 0x0, @local}}}, 0x5000) 12:15:53 executing program 6: gettid() r0 = fork() ptrace$setopts(0x4200, r0, 0x80000000, 0x20) rt_tgsigqueueinfo(0x0, r0, 0x2c, &(0x7f0000000000)={0xa, 0x2, 0x7}) syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xf8, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r0}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}]}, 0xf8}, 0x1, 0x0, 0x0, 0x40080}, 0x40001) syz_genetlink_get_family_id$gtp(&(0x7f0000000440), 0xffffffffffffffff) sched_getparam(0x0, &(0x7f0000000680)) 12:15:53 executing program 7: gettid() r0 = fork() ptrace$setopts(0x4200, r0, 0x80000000, 0x20) rt_tgsigqueueinfo(0x0, r0, 0x2c, &(0x7f0000000000)={0xa, 0x2, 0x7}) syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xf8, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r0}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}]}, 0xf8}, 0x1, 0x0, 0x0, 0x40080}, 0x40001) syz_genetlink_get_family_id$gtp(&(0x7f0000000440), 0xffffffffffffffff) sched_getparam(0x0, &(0x7f0000000680)) 12:15:53 executing program 0: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="02c8003f00b8"], 0x17) syz_emit_vhci(&(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) 12:15:53 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000005140)=[{{&(0x7f0000000100)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000640)=[@rthdr_2292={{0x18}}], 0x18}}], 0x1, 0x0) 12:15:53 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[@mss, @window={0x3, 0x101}], 0x366) 12:15:53 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5f000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000be000000000000be000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c0000000000001c00080000000008007809140b2a3a08020000010000010100202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202073797a6b616c6c65722020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202047454e49534f494d4147452049534f20393636302f4846532046494c4553595354454d2043524541544f5220284329203139393320452e594f554e4744414c452028432920313939372d32303036204a2e50454152534f4e2f4a2e534348494c4c494e472028432920323030362d32303037204344524b4954205445414d202066696c6533202020202020202020202020202020202020202020202020202020202020202066696c6531202020202020202020202020202020202020202020202020202020202020202066696c6532202020202020202020202020202020202020202020202020202020202020202032303230303932303131343235383030083230323030393230313134323538303008303030303030303030303030303030300032303230303932303131343235383030080100202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202000"/1408, 0x580, 0x8000}, {&(0x7f0000010600)="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"/1408, 0x580, 0x8800}, {&(0x7f0000010c00)="ff43443030310100"/32, 0x20, 0x9000}, {&(0x7f0000010d00)="01001c0000000100000005001d000000010046494c4530000000000000000000", 0x20, 0xa000}, {&(0x7f0000010e00)="01000000001c0001000005000000001d000146494c4530000000000000000000", 0x20, 0xb000}, {&(0x7f0000010f00)="01001e000000010000000a001f000000010000660069006c0065003000000000", 0x20, 0xc000}, {&(0x7f0000011000)="01000000001e000100000a000000001f000100660069006c0065003000000000", 0x20, 0xd000}, {&(0x7f0000011100)="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"/288, 0x120, 0xe000}, {&(0x7f0000011300)="22001d0000000000001d00080000000008007809140b2a3a0802000001000001010022001c0000000000001c00080000000008007809140b2a3a080200000100000101012a0027000000000000271a0400000000041a7809140b2a3a08000000010000010846494c45302e3b3100"/128, 0x80, 0xe800}, {&(0x7f0000011400)="22001e0000000000001e00080000000008007809140b2a3a0802000001000001010022001e0000000000001e00080000000008007809140b2a3a080200000100000101013400200000000000002064000000000000647809140b2a3a08000000010000011200660069006c0065002e0063006f006c0064002c001f0000000000001f00080000000008007809140b2a3a08020000010000010a00660069006c00650030002c0021000000000000210a0000000000000a7809140b2a3a08000000010000010a00660069006c00650031002c00220000000000002228230000000023287809140b2a3a08000000010000010a00660069006c00650032002c00220000000000002228230000000023287809140b2a3a08000000010000010a00660069006c0065003300"/320, 0x140, 0xf000}, {&(0x7f0000011600)="22001f0000000000001f00080000000008007809140b2a3a0802000001000001010022001e0000000000001e00080000000008007809140b2a3a080200000100000101012c0027000000000000271a0400000000041a7809140b2a3a08000000010000010a00660069006c0065003000"/128, 0x80, 0xf800}, {&(0x7f0000011700)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x10000}, {&(0x7f0000011800)='syzkallers\x00'/32, 0x20, 0x10800}, {&(0x7f0000011900)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x13800}], 0x0, &(0x7f0000011e00)) 12:15:53 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000000)=0x3, 0x4) sendmmsg$sock(r0, &(0x7f00000038c0)=[{{&(0x7f00000036c0)=@in={0xa, 0x4e23, @local}, 0x80, 0x0}}], 0x1, 0x4c804) sendmmsg$inet6(r0, &(0x7f0000001500)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000240)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000380)="f23456cdf8dcdf7db792ad814a5cf50d472768038adb2abd9c2fbab92f01a1d2238f03ed64aa36d69764d8ed3fbb410c0d87a1a4bd7a0da7cfcae32d86dbd1dd63e0b5700fa6884dcd0119de", 0x4c}, {&(0x7f0000000400)="a24cf5473e3db9affd383fbf149cee47f6e70defda7be4740c28fea8f72cf7ed10af2881a340e35ed50a50d9b2a07374648b678f152622af297840a9bd640e87fb23af55fc8074fc02b646c6ecd5c6c972b80d3a99eaa3ab423981932ceec877a7a35164dc8960b6e44440bc8cff2753c379920319", 0x75}], 0x2}}], 0x2, 0x0) [ 129.053876] loop1: detected capacity change from 0 to 760 [ 129.064434] Bluetooth: Unexpected start frame (len 18) 12:15:53 executing program 0: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="02c8003f00b8"], 0x17) syz_emit_vhci(&(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) 12:15:53 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000000)=0x3, 0x4) sendmmsg$sock(r0, &(0x7f00000038c0)=[{{&(0x7f00000036c0)=@in={0xa, 0x4e23, @local}, 0x80, 0x0}}], 0x1, 0x4c804) sendmmsg$inet6(r0, &(0x7f0000001500)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000240)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000380)="f23456cdf8dcdf7db792ad814a5cf50d472768038adb2abd9c2fbab92f01a1d2238f03ed64aa36d69764d8ed3fbb410c0d87a1a4bd7a0da7cfcae32d86dbd1dd63e0b5700fa6884dcd0119de", 0x4c}, {&(0x7f0000000400)="a24cf5473e3db9affd383fbf149cee47f6e70defda7be4740c28fea8f72cf7ed10af2881a340e35ed50a50d9b2a07374648b678f152622af297840a9bd640e87fb23af55fc8074fc02b646c6ecd5c6c972b80d3a99eaa3ab423981932ceec877a7a35164dc8960b6e44440bc8cff2753c379920319", 0x75}], 0x2}}], 0x2, 0x0) 12:15:53 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[@mss, @window={0x3, 0x101}], 0x366) [ 129.144609] Bluetooth: Unexpected start frame (len 18) [ 129.281894] Bluetooth: Unexpected start frame (len 18) 12:15:53 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000008540)={0x0, {{0x4, 0x0, @local}}}, 0x5000) 12:15:53 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5f000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000be000000000000be000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c0000000000001c00080000000008007809140b2a3a08020000010000010100202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202073797a6b616c6c65722020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202047454e49534f494d4147452049534f20393636302f4846532046494c4553595354454d2043524541544f5220284329203139393320452e594f554e4744414c452028432920313939372d32303036204a2e50454152534f4e2f4a2e534348494c4c494e472028432920323030362d32303037204344524b4954205445414d202066696c6533202020202020202020202020202020202020202020202020202020202020202066696c6531202020202020202020202020202020202020202020202020202020202020202066696c6532202020202020202020202020202020202020202020202020202020202020202032303230303932303131343235383030083230323030393230313134323538303008303030303030303030303030303030300032303230303932303131343235383030080100202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202000"/1408, 0x580, 0x8000}, {&(0x7f0000010600)="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"/1408, 0x580, 0x8800}, {&(0x7f0000010c00)="ff43443030310100"/32, 0x20, 0x9000}, {&(0x7f0000010d00)="01001c0000000100000005001d000000010046494c4530000000000000000000", 0x20, 0xa000}, {&(0x7f0000010e00)="01000000001c0001000005000000001d000146494c4530000000000000000000", 0x20, 0xb000}, {&(0x7f0000010f00)="01001e000000010000000a001f000000010000660069006c0065003000000000", 0x20, 0xc000}, {&(0x7f0000011000)="01000000001e000100000a000000001f000100660069006c0065003000000000", 0x20, 0xd000}, {&(0x7f0000011100)="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"/288, 0x120, 0xe000}, {&(0x7f0000011300)="22001d0000000000001d00080000000008007809140b2a3a0802000001000001010022001c0000000000001c00080000000008007809140b2a3a080200000100000101012a0027000000000000271a0400000000041a7809140b2a3a08000000010000010846494c45302e3b3100"/128, 0x80, 0xe800}, {&(0x7f0000011400)="22001e0000000000001e00080000000008007809140b2a3a0802000001000001010022001e0000000000001e00080000000008007809140b2a3a080200000100000101013400200000000000002064000000000000647809140b2a3a08000000010000011200660069006c0065002e0063006f006c0064002c001f0000000000001f00080000000008007809140b2a3a08020000010000010a00660069006c00650030002c0021000000000000210a0000000000000a7809140b2a3a08000000010000010a00660069006c00650031002c00220000000000002228230000000023287809140b2a3a08000000010000010a00660069006c00650032002c00220000000000002228230000000023287809140b2a3a08000000010000010a00660069006c0065003300"/320, 0x140, 0xf000}, {&(0x7f0000011600)="22001f0000000000001f00080000000008007809140b2a3a0802000001000001010022001e0000000000001e00080000000008007809140b2a3a080200000100000101012c0027000000000000271a0400000000041a7809140b2a3a08000000010000010a00660069006c0065003000"/128, 0x80, 0xf800}, {&(0x7f0000011700)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x10000}, {&(0x7f0000011800)='syzkallers\x00'/32, 0x20, 0x10800}, {&(0x7f0000011900)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x13800}], 0x0, &(0x7f0000011e00)) 12:15:53 executing program 0: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="02c8003f00b8"], 0x17) syz_emit_vhci(&(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) 12:15:53 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000005140)=[{{&(0x7f0000000100)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000640)=[@rthdr_2292={{0x18}}], 0x18}}], 0x1, 0x0) 12:15:53 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[@mss, @window={0x3, 0x101}], 0x366) 12:15:53 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000000)=0x3, 0x4) sendmmsg$sock(r0, &(0x7f00000038c0)=[{{&(0x7f00000036c0)=@in={0xa, 0x4e23, @local}, 0x80, 0x0}}], 0x1, 0x4c804) sendmmsg$inet6(r0, &(0x7f0000001500)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000240)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000380)="f23456cdf8dcdf7db792ad814a5cf50d472768038adb2abd9c2fbab92f01a1d2238f03ed64aa36d69764d8ed3fbb410c0d87a1a4bd7a0da7cfcae32d86dbd1dd63e0b5700fa6884dcd0119de", 0x4c}, {&(0x7f0000000400)="a24cf5473e3db9affd383fbf149cee47f6e70defda7be4740c28fea8f72cf7ed10af2881a340e35ed50a50d9b2a07374648b678f152622af297840a9bd640e87fb23af55fc8074fc02b646c6ecd5c6c972b80d3a99eaa3ab423981932ceec877a7a35164dc8960b6e44440bc8cff2753c379920319", 0x75}], 0x2}}], 0x2, 0x0) 12:15:53 executing program 6: gettid() r0 = fork() ptrace$setopts(0x4200, r0, 0x80000000, 0x20) rt_tgsigqueueinfo(0x0, r0, 0x2c, &(0x7f0000000000)={0xa, 0x2, 0x7}) syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xf8, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r0}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}]}, 0xf8}, 0x1, 0x0, 0x0, 0x40080}, 0x40001) syz_genetlink_get_family_id$gtp(&(0x7f0000000440), 0xffffffffffffffff) sched_getparam(0x0, &(0x7f0000000680)) 12:15:53 executing program 7: gettid() r0 = fork() ptrace$setopts(0x4200, r0, 0x80000000, 0x20) rt_tgsigqueueinfo(0x0, r0, 0x2c, &(0x7f0000000000)={0xa, 0x2, 0x7}) syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xf8, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r0}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}]}, 0xf8}, 0x1, 0x0, 0x0, 0x40080}, 0x40001) syz_genetlink_get_family_id$gtp(&(0x7f0000000440), 0xffffffffffffffff) sched_getparam(0x0, &(0x7f0000000680)) [ 129.308029] loop1: detected capacity change from 0 to 760 12:15:53 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5f000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000be000000000000be000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c0000000000001c00080000000008007809140b2a3a08020000010000010100202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202073797a6b616c6c65722020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202047454e49534f494d4147452049534f20393636302f4846532046494c4553595354454d2043524541544f5220284329203139393320452e594f554e4744414c452028432920313939372d32303036204a2e50454152534f4e2f4a2e534348494c4c494e472028432920323030362d32303037204344524b4954205445414d202066696c6533202020202020202020202020202020202020202020202020202020202020202066696c6531202020202020202020202020202020202020202020202020202020202020202066696c6532202020202020202020202020202020202020202020202020202020202020202032303230303932303131343235383030083230323030393230313134323538303008303030303030303030303030303030300032303230303932303131343235383030080100202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202000"/1408, 0x580, 0x8000}, {&(0x7f0000010600)="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"/1408, 0x580, 0x8800}, {&(0x7f0000010c00)="ff43443030310100"/32, 0x20, 0x9000}, {&(0x7f0000010d00)="01001c0000000100000005001d000000010046494c4530000000000000000000", 0x20, 0xa000}, {&(0x7f0000010e00)="01000000001c0001000005000000001d000146494c4530000000000000000000", 0x20, 0xb000}, {&(0x7f0000010f00)="01001e000000010000000a001f000000010000660069006c0065003000000000", 0x20, 0xc000}, {&(0x7f0000011000)="01000000001e000100000a000000001f000100660069006c0065003000000000", 0x20, 0xd000}, {&(0x7f0000011100)="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"/288, 0x120, 0xe000}, {&(0x7f0000011300)="22001d0000000000001d00080000000008007809140b2a3a0802000001000001010022001c0000000000001c00080000000008007809140b2a3a080200000100000101012a0027000000000000271a0400000000041a7809140b2a3a08000000010000010846494c45302e3b3100"/128, 0x80, 0xe800}, {&(0x7f0000011400)="22001e0000000000001e00080000000008007809140b2a3a0802000001000001010022001e0000000000001e00080000000008007809140b2a3a080200000100000101013400200000000000002064000000000000647809140b2a3a08000000010000011200660069006c0065002e0063006f006c0064002c001f0000000000001f00080000000008007809140b2a3a08020000010000010a00660069006c00650030002c0021000000000000210a0000000000000a7809140b2a3a08000000010000010a00660069006c00650031002c00220000000000002228230000000023287809140b2a3a08000000010000010a00660069006c00650032002c00220000000000002228230000000023287809140b2a3a08000000010000010a00660069006c0065003300"/320, 0x140, 0xf000}, {&(0x7f0000011600)="22001f0000000000001f00080000000008007809140b2a3a0802000001000001010022001e0000000000001e00080000000008007809140b2a3a080200000100000101012c0027000000000000271a0400000000041a7809140b2a3a08000000010000010a00660069006c0065003000"/128, 0x80, 0xf800}, {&(0x7f0000011700)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x10000}, {&(0x7f0000011800)='syzkallers\x00'/32, 0x20, 0x10800}, {&(0x7f0000011900)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x13800}], 0x0, &(0x7f0000011e00)) [ 129.403854] loop1: detected capacity change from 0 to 760 12:15:53 executing program 7: gettid() r0 = fork() ptrace$setopts(0x4200, r0, 0x80000000, 0x20) rt_tgsigqueueinfo(0x0, r0, 0x2c, &(0x7f0000000000)={0xa, 0x2, 0x7}) syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xf8, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r0}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}]}, 0xf8}, 0x1, 0x0, 0x0, 0x40080}, 0x40001) syz_genetlink_get_family_id$gtp(&(0x7f0000000440), 0xffffffffffffffff) sched_getparam(0x0, &(0x7f0000000680)) 12:15:53 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000005140)=[{{&(0x7f0000000100)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000640)=[@rthdr_2292={{0x18}}], 0x18}}], 0x1, 0x0) 12:15:53 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000008540)={0x0, {{0x4, 0x0, @local}}}, 0x5000) 12:15:53 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000000)=0x3, 0x4) sendmmsg$sock(r0, &(0x7f00000038c0)=[{{&(0x7f00000036c0)=@in={0xa, 0x4e23, @local}, 0x80, 0x0}}], 0x1, 0x4c804) sendmmsg$inet6(r0, &(0x7f0000001500)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000240)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000380)="f23456cdf8dcdf7db792ad814a5cf50d472768038adb2abd9c2fbab92f01a1d2238f03ed64aa36d69764d8ed3fbb410c0d87a1a4bd7a0da7cfcae32d86dbd1dd63e0b5700fa6884dcd0119de", 0x4c}, {&(0x7f0000000400)="a24cf5473e3db9affd383fbf149cee47f6e70defda7be4740c28fea8f72cf7ed10af2881a340e35ed50a50d9b2a07374648b678f152622af297840a9bd640e87fb23af55fc8074fc02b646c6ecd5c6c972b80d3a99eaa3ab423981932ceec877a7a35164dc8960b6e44440bc8cff2753c379920319", 0x75}], 0x2}}], 0x2, 0x0) 12:15:53 executing program 0: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="02c8003f00b8"], 0x17) syz_emit_vhci(&(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) 12:15:53 executing program 6: gettid() r0 = fork() ptrace$setopts(0x4200, r0, 0x80000000, 0x20) rt_tgsigqueueinfo(0x0, r0, 0x2c, &(0x7f0000000000)={0xa, 0x2, 0x7}) syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xf8, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r0}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}]}, 0xf8}, 0x1, 0x0, 0x0, 0x40080}, 0x40001) syz_genetlink_get_family_id$gtp(&(0x7f0000000440), 0xffffffffffffffff) sched_getparam(0x0, &(0x7f0000000680)) 12:15:53 executing program 3: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$revoke(0x1d, r0) request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, r0) 12:15:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') openat(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) [ 129.545352] Bluetooth: Unexpected start frame (len 18) 12:15:53 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000000)=0x3, 0x4) sendmmsg$sock(r0, &(0x7f00000038c0)=[{{&(0x7f00000036c0)=@in={0xa, 0x4e23, @local}, 0x80, 0x0}}], 0x1, 0x4c804) sendmmsg$inet6(r0, &(0x7f0000001500)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000240)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000380)="f23456cdf8dcdf7db792ad814a5cf50d472768038adb2abd9c2fbab92f01a1d2238f03ed64aa36d69764d8ed3fbb410c0d87a1a4bd7a0da7cfcae32d86dbd1dd63e0b5700fa6884dcd0119de", 0x4c}, {&(0x7f0000000400)="a24cf5473e3db9affd383fbf149cee47f6e70defda7be4740c28fea8f72cf7ed10af2881a340e35ed50a50d9b2a07374648b678f152622af297840a9bd640e87fb23af55fc8074fc02b646c6ecd5c6c972b80d3a99eaa3ab423981932ceec877a7a35164dc8960b6e44440bc8cff2753c379920319", 0x75}], 0x2}}], 0x2, 0x0) 12:15:53 executing program 0: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="02c8003f00b8"], 0x17) syz_emit_vhci(&(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) 12:15:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') openat(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) [ 129.619801] Bluetooth: Unexpected start frame (len 18) 12:15:54 executing program 5: r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) mknodat$null(r1, &(0x7f0000000040)='./file0\x00', 0xffffc000, 0x103) 12:15:54 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 12:15:54 executing program 3: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$revoke(0x1d, r0) request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, r0) [ 129.646172] audit: type=1400 audit(1663330554.037:7): avc: denied { open } for pid=4048 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 129.647752] audit: type=1400 audit(1663330554.037:8): avc: denied { kernel } for pid=4048 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 12:15:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') openat(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) [ 129.666405] ------------[ cut here ]------------ [ 129.666429] [ 129.666433] ====================================================== [ 129.666436] WARNING: possible circular locking dependency detected [ 129.666441] 6.0.0-rc5-next-20220916 #1 Not tainted [ 129.666447] ------------------------------------------------------ [ 129.666450] syz-executor.2/4050 is trying to acquire lock: [ 129.666457] ffffffff853fa878 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 129.666498] [ 129.666498] but task is already holding lock: [ 129.666501] ffff88800debf420 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 129.666529] [ 129.666529] which lock already depends on the new lock. [ 129.666529] [ 129.666532] [ 129.666532] the existing dependency chain (in reverse order) is: [ 129.666536] [ 129.666536] -> #3 (&ctx->lock){....}-{2:2}: [ 129.666550] _raw_spin_lock+0x2a/0x40 [ 129.666567] __perf_event_task_sched_out+0x53b/0x18d0 [ 129.666580] __schedule+0xedd/0x2470 [ 129.666590] schedule+0xda/0x1b0 [ 129.666600] exit_to_user_mode_prepare+0x114/0x1a0 [ 129.666620] syscall_exit_to_user_mode+0x19/0x40 [ 129.666638] do_syscall_64+0x48/0x90 [ 129.666652] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 129.666670] [ 129.666670] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 129.666683] _raw_spin_lock_nested+0x30/0x40 [ 129.666698] raw_spin_rq_lock_nested+0x1e/0x30 [ 129.666711] task_fork_fair+0x63/0x4d0 [ 129.666728] sched_cgroup_fork+0x3d0/0x540 [ 129.666741] copy_process+0x4183/0x6e20 [ 129.666752] kernel_clone+0xe7/0x890 [ 129.666761] user_mode_thread+0xad/0xf0 [ 129.666772] rest_init+0x24/0x250 [ 129.666788] arch_call_rest_init+0xf/0x14 [ 129.666800] start_kernel+0x4c1/0x4e6 [ 129.666810] secondary_startup_64_no_verify+0xe0/0xeb [ 129.666824] [ 129.666824] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 129.666838] _raw_spin_lock_irqsave+0x39/0x60 [ 129.666853] try_to_wake_up+0xab/0x1920 [ 129.666865] up+0x75/0xb0 [ 129.666876] __up_console_sem+0x6e/0x80 [ 129.666892] console_unlock+0x46a/0x590 [ 129.666907] vprintk_emit+0x1bd/0x560 [ 129.666923] vprintk+0x84/0xa0 [ 129.666939] _printk+0xba/0xf1 [ 129.666957] kauditd_hold_skb.cold+0x3f/0x4e [ 129.666971] kauditd_send_queue+0x233/0x290 [ 129.666986] kauditd_thread+0x5da/0x9a0 [ 129.666999] kthread+0x2ed/0x3a0 [ 129.667014] ret_from_fork+0x22/0x30 [ 129.667026] [ 129.667026] -> #0 ((console_sem).lock){....}-{2:2}: [ 129.667039] __lock_acquire+0x2a02/0x5e70 [ 129.667055] lock_acquire+0x1a2/0x530 [ 129.667070] _raw_spin_lock_irqsave+0x39/0x60 [ 129.667085] down_trylock+0xe/0x70 [ 129.667097] __down_trylock_console_sem+0x3b/0xd0 [ 129.667113] vprintk_emit+0x16b/0x560 [ 129.667128] vprintk+0x84/0xa0 [ 129.667144] _printk+0xba/0xf1 [ 129.667160] report_bug.cold+0x72/0xab [ 129.667172] handle_bug+0x3c/0x70 [ 129.667185] exc_invalid_op+0x14/0x50 [ 129.667198] asm_exc_invalid_op+0x16/0x20 [ 129.667214] group_sched_out.part.0+0x2c7/0x460 [ 129.667225] ctx_sched_out+0x8f1/0xc10 [ 129.667234] __perf_event_task_sched_out+0x6d0/0x18d0 [ 129.667247] __schedule+0xedd/0x2470 [ 129.667256] schedule+0xda/0x1b0 [ 129.667266] exit_to_user_mode_prepare+0x114/0x1a0 [ 129.667284] syscall_exit_to_user_mode+0x19/0x40 [ 129.667301] do_syscall_64+0x48/0x90 [ 129.667314] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 129.667331] [ 129.667331] other info that might help us debug this: [ 129.667331] [ 129.667334] Chain exists of: [ 129.667334] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 129.667334] [ 129.667349] Possible unsafe locking scenario: [ 129.667349] [ 129.667351] CPU0 CPU1 [ 129.667354] ---- ---- [ 129.667356] lock(&ctx->lock); [ 129.667362] lock(&rq->__lock); [ 129.667368] lock(&ctx->lock); [ 129.667375] lock((console_sem).lock); [ 129.667380] [ 129.667380] *** DEADLOCK *** [ 129.667380] [ 129.667382] 2 locks held by syz-executor.2/4050: [ 129.667389] #0: ffff88806ce37cd8 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 129.667415] #1: ffff88800debf420 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 129.667442] [ 129.667442] stack backtrace: [ 129.667462] CPU: 0 PID: 4050 Comm: syz-executor.2 Not tainted 6.0.0-rc5-next-20220916 #1 [ 129.667475] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 129.667484] Call Trace: [ 129.667487] [ 129.667492] dump_stack_lvl+0x8b/0xb3 [ 129.667506] check_noncircular+0x263/0x2e0 [ 129.667523] ? format_decode+0x26c/0xb50 [ 129.667538] ? print_circular_bug+0x450/0x450 [ 129.667555] ? enable_ptr_key_workfn+0x20/0x20 [ 129.667570] ? format_decode+0x26c/0xb50 [ 129.667585] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 129.667603] __lock_acquire+0x2a02/0x5e70 [ 129.667624] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 129.667645] lock_acquire+0x1a2/0x530 [ 129.667662] ? down_trylock+0xe/0x70 [ 129.667676] ? rcu_read_unlock+0x40/0x40 [ 129.667696] ? vprintk+0x84/0xa0 [ 129.667713] _raw_spin_lock_irqsave+0x39/0x60 [ 129.667729] ? down_trylock+0xe/0x70 [ 129.667742] down_trylock+0xe/0x70 [ 129.667755] ? vprintk+0x84/0xa0 [ 129.667772] __down_trylock_console_sem+0x3b/0xd0 [ 129.667789] vprintk_emit+0x16b/0x560 [ 129.667807] vprintk+0x84/0xa0 [ 129.667824] _printk+0xba/0xf1 [ 129.667842] ? record_print_text.cold+0x16/0x16 [ 129.667864] ? report_bug.cold+0x66/0xab [ 129.667878] ? group_sched_out.part.0+0x2c7/0x460 [ 129.667889] report_bug.cold+0x72/0xab [ 129.667904] handle_bug+0x3c/0x70 [ 129.667918] exc_invalid_op+0x14/0x50 [ 129.667933] asm_exc_invalid_op+0x16/0x20 [ 129.667950] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 129.667964] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 129.667975] RSP: 0018:ffff8880410afc48 EFLAGS: 00010006 [ 129.667985] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 129.667992] RDX: ffff888040ff9ac0 RSI: ffffffff81566027 RDI: 0000000000000005 [ 129.668000] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 129.668007] R10: 0000000000000000 R11: ffffffff865ac01b R12: ffff88800debf400 [ 129.668015] R13: ffff88806ce3d100 R14: ffffffff8547c7c0 R15: 0000000000000002 [ 129.668026] ? group_sched_out.part.0+0x2c7/0x460 [ 129.668039] ? group_sched_out.part.0+0x2c7/0x460 [ 129.668052] ctx_sched_out+0x8f1/0xc10 [ 129.668065] __perf_event_task_sched_out+0x6d0/0x18d0 [ 129.668080] ? lock_is_held_type+0xd7/0x130 [ 129.668099] ? __perf_cgroup_move+0x160/0x160 [ 129.668110] ? set_next_entity+0x304/0x550 [ 129.668127] ? update_curr+0x267/0x740 [ 129.668145] ? lock_is_held_type+0xd7/0x130 [ 129.668164] __schedule+0xedd/0x2470 [ 129.668178] ? io_schedule_timeout+0x150/0x150 [ 129.668191] ? rcu_read_lock_sched_held+0x3e/0x80 [ 129.668211] schedule+0xda/0x1b0 [ 129.668222] exit_to_user_mode_prepare+0x114/0x1a0 [ 129.668242] syscall_exit_to_user_mode+0x19/0x40 [ 129.668260] do_syscall_64+0x48/0x90 [ 129.668274] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 129.668292] RIP: 0033:0x7f5005022b19 [ 129.668300] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 129.668311] RSP: 002b:00007f5002598218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 129.668322] RAX: 0000000000000001 RBX: 00007f5005135f68 RCX: 00007f5005022b19 [ 129.668329] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f5005135f6c [ 129.668337] RBP: 00007f5005135f60 R08: 000000000000000e R09: 0000000000000000 [ 129.668344] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f5005135f6c [ 129.668351] R13: 00007ffe5b9172ff R14: 00007f5002598300 R15: 0000000000022000 [ 129.668364] [ 129.724174] WARNING: CPU: 0 PID: 4050 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 129.724845] Modules linked in: [ 129.725087] CPU: 0 PID: 4050 Comm: syz-executor.2 Not tainted 6.0.0-rc5-next-20220916 #1 [ 129.725668] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 129.726488] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 129.726890] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 129.728209] RSP: 0018:ffff8880410afc48 EFLAGS: 00010006 [ 129.728602] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 129.729122] RDX: ffff888040ff9ac0 RSI: ffffffff81566027 RDI: 0000000000000005 [ 129.729638] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 129.730157] R10: 0000000000000000 R11: ffffffff865ac01b R12: ffff88800debf400 [ 129.730675] R13: ffff88806ce3d100 R14: ffffffff8547c7c0 R15: 0000000000000002 [ 129.731193] FS: 00007f5002598700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 129.731798] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 129.732225] CR2: 00007ffe046a4fc8 CR3: 000000003f5e2000 CR4: 0000000000350ef0 [ 129.732740] Call Trace: [ 129.732933] [ 129.733106] ctx_sched_out+0x8f1/0xc10 [ 129.733401] __perf_event_task_sched_out+0x6d0/0x18d0 [ 129.733774] ? lock_is_held_type+0xd7/0x130 [ 129.734101] ? __perf_cgroup_move+0x160/0x160 [ 129.734442] ? set_next_entity+0x304/0x550 [ 129.734768] ? update_curr+0x267/0x740 [ 129.735062] ? lock_is_held_type+0xd7/0x130 [ 129.735389] __schedule+0xedd/0x2470 [ 129.735683] ? io_schedule_timeout+0x150/0x150 [ 129.736025] ? rcu_read_lock_sched_held+0x3e/0x80 [ 129.736390] schedule+0xda/0x1b0 [ 129.736651] exit_to_user_mode_prepare+0x114/0x1a0 [ 129.737025] syscall_exit_to_user_mode+0x19/0x40 [ 129.737394] do_syscall_64+0x48/0x90 [ 129.737683] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 129.738067] RIP: 0033:0x7f5005022b19 [ 129.738345] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 129.739675] RSP: 002b:00007f5002598218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 129.740237] RAX: 0000000000000001 RBX: 00007f5005135f68 RCX: 00007f5005022b19 [ 129.740767] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f5005135f6c [ 129.741288] RBP: 00007f5005135f60 R08: 000000000000000e R09: 0000000000000000 [ 129.741815] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f5005135f6c [ 129.742314] R13: 00007ffe5b9172ff R14: 00007f5002598300 R15: 0000000000022000 [ 129.742842] [ 129.743021] irq event stamp: 1108 [ 129.743283] hardirqs last enabled at (1107): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 129.743987] hardirqs last disabled at (1108): [] __schedule+0x1225/0x2470 [ 129.744595] softirqs last enabled at (974): [] __irq_exit_rcu+0x11b/0x180 [ 129.745227] softirqs last disabled at (669): [] __irq_exit_rcu+0x11b/0x180 [ 129.745850] ---[ end trace 0000000000000000 ]--- 12:15:54 executing program 0: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="02c8003f00b8"], 0x17) syz_emit_vhci(&(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) [ 129.786799] Bluetooth: Unexpected start frame (len 18) 12:15:54 executing program 5: r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) mknodat$null(r1, &(0x7f0000000040)='./file0\x00', 0xffffc000, 0x103) 12:15:54 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000000)=0x3, 0x4) sendmmsg$sock(r0, &(0x7f00000038c0)=[{{&(0x7f00000036c0)=@in={0xa, 0x4e23, @local}, 0x80, 0x0}}], 0x1, 0x4c804) sendmmsg$inet6(r0, &(0x7f0000001500)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000240)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000380)="f23456cdf8dcdf7db792ad814a5cf50d472768038adb2abd9c2fbab92f01a1d2238f03ed64aa36d69764d8ed3fbb410c0d87a1a4bd7a0da7cfcae32d86dbd1dd63e0b5700fa6884dcd0119de", 0x4c}, {&(0x7f0000000400)="a24cf5473e3db9affd383fbf149cee47f6e70defda7be4740c28fea8f72cf7ed10af2881a340e35ed50a50d9b2a07374648b678f152622af297840a9bd640e87fb23af55fc8074fc02b646c6ecd5c6c972b80d3a99eaa3ab423981932ceec877a7a35164dc8960b6e44440bc8cff2753c379920319", 0x75}], 0x2}}], 0x2, 0x0) 12:15:54 executing program 7: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$revoke(0x1d, r0) request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, r0) 12:15:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') openat(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) 12:15:54 executing program 0: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$revoke(0x1d, r0) request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, r0) [ 129.888432] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 12:15:54 executing program 7: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$revoke(0x1d, r0) request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, r0) 12:15:54 executing program 5: r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) mknodat$null(r1, &(0x7f0000000040)='./file0\x00', 0xffffc000, 0x103) 12:15:54 executing program 0: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$revoke(0x1d, r0) request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, r0) 12:15:54 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000200)="e6", 0x1}], 0x1, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x80000001) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x3, &(0x7f0000000140), 0x4) 12:15:54 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1c, 0x0, 0x0) 12:15:54 executing program 7: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$revoke(0x1d, r0) request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, r0) [ 129.955888] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 12:15:54 executing program 5: r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) mknodat$null(r1, &(0x7f0000000040)='./file0\x00', 0xffffc000, 0x103) [ 129.990036] syz-executor.2 (4050) used greatest stack depth: 23640 bytes left 12:15:54 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 12:15:54 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@ceph_nfs_confh={0x10, 0x2, {0x2}}, 0x101000) 12:15:54 executing program 0: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$revoke(0x1d, r0) request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, r0) 12:15:54 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1c, 0x0, 0x0) 12:15:54 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000200)="e6", 0x1}], 0x1, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x80000001) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x3, &(0x7f0000000140), 0x4) 12:15:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000200)="e6", 0x1}], 0x1, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x80000001) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x3, &(0x7f0000000140), 0x4) 12:15:54 executing program 3: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$revoke(0x1d, r0) request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, r0) 12:15:54 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 12:15:54 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000200)="e6", 0x1}], 0x1, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x80000001) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x3, &(0x7f0000000140), 0x4) 12:15:54 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@ceph_nfs_confh={0x10, 0x2, {0x2}}, 0x101000) 12:15:54 executing program 3: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$revoke(0x1d, r0) request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, r0) 12:15:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000200)="e6", 0x1}], 0x1, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x80000001) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x3, &(0x7f0000000140), 0x4) 12:15:54 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1c, 0x0, 0x0) 12:15:54 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 12:15:54 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@ceph_nfs_confh={0x10, 0x2, {0x2}}, 0x101000) 12:15:54 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000200)="e6", 0x1}], 0x1, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x80000001) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x3, &(0x7f0000000140), 0x4) [ 130.176050] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 130.209714] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 130.215167] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 12:15:54 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 12:15:54 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 12:15:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000200)="e6", 0x1}], 0x1, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x80000001) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x3, &(0x7f0000000140), 0x4) 12:15:54 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1c, 0x0, 0x0) 12:15:54 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 12:15:54 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 12:15:54 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@ceph_nfs_confh={0x10, 0x2, {0x2}}, 0x101000) 12:15:54 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 12:15:54 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 12:15:54 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) [ 130.355423] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 12:15:54 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) [ 130.400332] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 130.401641] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 130.402680] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 130.416355] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 130.442717] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 130.444565] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 130.457131] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 12:15:54 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 12:15:54 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 12:15:54 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) [ 130.598566] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 130.676229] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 130.695170] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 12:15:55 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 12:15:55 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 12:15:55 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 12:15:55 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 12:15:55 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 12:15:55 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 12:15:55 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 12:15:55 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) [ 130.816484] hrtimer: interrupt took 21130 ns [ 130.860725] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 130.865992] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 130.899656] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 12:15:55 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) [ 131.333459] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 131.333515] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 131.334904] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 12:15:55 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) [ 131.528299] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 12:15:56 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 12:15:56 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) [ 131.723629] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 131.783203] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 12:15:56 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) [ 131.873578] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 131.894352] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 131.940255] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 132.106014] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 12:15:56 executing program 6: timer_create(0x0, 0x0, 0x0) 12:15:56 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 12:15:56 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x19, 0x0, 0x0) 12:15:56 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 12:15:56 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 12:15:56 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 12:15:56 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 12:15:56 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmmsg(r0, &(0x7f0000006840)=[{{&(0x7f0000000400)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "99c6aa0d5e2681d4226f65564766a510c07437d5cf1b6541639b434490192fdfbc26bb2a2376f2931e5cda525eed9e60a33a3b3e801438f06ebeb16f4b647c"}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000480)='[', 0x1}, {0x0}], 0x2, &(0x7f00000006c0)=[{0x28, 0x0, 0x0, "a70c88b7e196beb8e7ab4a6a671c3afc03"}], 0x28}}], 0x1, 0x40040) 12:15:56 executing program 6: syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_cmd_status={{0xf, 0x4}, {0x1, 0xfa, 0x41b}}}, 0x7) 12:15:56 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x19, 0x0, 0x0) 12:15:56 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmmsg(r0, &(0x7f0000006840)=[{{&(0x7f0000000400)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "99c6aa0d5e2681d4226f65564766a510c07437d5cf1b6541639b434490192fdfbc26bb2a2376f2931e5cda525eed9e60a33a3b3e801438f06ebeb16f4b647c"}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000480)='[', 0x1}, {0x0}], 0x2, &(0x7f00000006c0)=[{0x28, 0x0, 0x0, "a70c88b7e196beb8e7ab4a6a671c3afc03"}], 0x28}}], 0x1, 0x40040) [ 132.392648] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 12:15:56 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x3, 0x5, &(0x7f0000000480)=[{&(0x7f0000000080)="94d1c3a8499435b3145b333b774718995c0f8ef70eb36d455d13f77ba762c66e3c3ea855d2c97a3c2bd35d984ac3084bdf810f920a00c8f9f6c8aa23c96a449cb89c8dc75127efb34ebe24bd4c5afc0f760f0c803a59151242865e19d17c84f4ed2a2d11e262a66d5ea4b46d32b3a2631c17742fb4517ac0d349ff8302e822131447b24fcec59e3b8ea6d6f961", 0x8d, 0x10001}, {&(0x7f0000000140)="dcfd1ba5b73f1dd2ac21ef8a61e8d4e19c603ed0453d38b86718b9d8450b806c8c6d8f9b6afa28f4627781e92063fe560721cb3c3a709079d5", 0x39, 0xa6}, {&(0x7f0000000180)="227b70035a66ea8bdb5db15017fcb2c495442626c2f8aa5d155a9df92aa7f0fa4c7d26c4be30556fba7ced5adddc8c69fbd8835a0877277ad4027988b247532d664edb346c09afbee0446706c4fbd42d61163f0dabe8c05382958edbfe2ecfce3027b557b1157df0a9335dc9634eff77ed92dfc92b1800baf52186ae1f6dd55cd6a782b1498df62dd6820200", 0x8c}, {0x0}, {&(0x7f00000003c0), 0x0, 0x9}], 0x2002000, &(0x7f0000000540)={[{@mode={'mode', 0x3d, 0x401}}], [{@dont_hash}, {@fsmagic={'fsmagic', 0x3d, 0x9}}, {@euid_lt}, {@dont_measure}, {@subj_type={'subj_type', 0x3d, '**^/,-,]-'}}, {@context={'context', 0x3d, 'system_u'}}]}) [ 132.404589] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 12:15:56 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x19, 0x0, 0x0) 12:15:56 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmmsg(r0, &(0x7f0000006840)=[{{&(0x7f0000000400)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "99c6aa0d5e2681d4226f65564766a510c07437d5cf1b6541639b434490192fdfbc26bb2a2376f2931e5cda525eed9e60a33a3b3e801438f06ebeb16f4b647c"}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000480)='[', 0x1}, {0x0}], 0x2, &(0x7f00000006c0)=[{0x28, 0x0, 0x0, "a70c88b7e196beb8e7ab4a6a671c3afc03"}], 0x28}}], 0x1, 0x40040) 12:15:56 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) [ 132.452536] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 132.458842] loop6: detected capacity change from 0 to 256 [ 132.459380] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 132.461202] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 12:15:56 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) [ 132.473029] loop6: detected capacity change from 0 to 256 [ 132.576676] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 132.619292] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 12:15:57 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 12:15:57 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmmsg(r0, &(0x7f0000006840)=[{{&(0x7f0000000400)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "99c6aa0d5e2681d4226f65564766a510c07437d5cf1b6541639b434490192fdfbc26bb2a2376f2931e5cda525eed9e60a33a3b3e801438f06ebeb16f4b647c"}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000480)='[', 0x1}, {0x0}], 0x2, &(0x7f00000006c0)=[{0x28, 0x0, 0x0, "a70c88b7e196beb8e7ab4a6a671c3afc03"}], 0x28}}], 0x1, 0x40040) 12:15:57 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/cgroups\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000200)=""/231, 0xe7}], 0x1, 0x4, 0x0) 12:15:57 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x19, 0x0, 0x0) 12:15:57 executing program 3: semctl$SETVAL(0x0, 0x0, 0x10, 0x0) 12:15:57 executing program 0: mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3) mlock(&(0x7f0000fed000/0x13000)=nil, 0x13000) 12:15:57 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 12:15:57 executing program 5: memfd_create(0x0, 0x9) 12:15:57 executing program 3: semctl$SETVAL(0x0, 0x0, 0x10, 0x0) 12:15:57 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/cgroups\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000200)=""/231, 0xe7}], 0x1, 0x4, 0x0) 12:15:57 executing program 1: clock_adjtime(0x0, &(0x7f0000000500)={0xfff, 0x0, 0xfffffffffffffff9}) clock_adjtime(0x0, &(0x7f0000000a80)={0x7}) 12:15:57 executing program 5: memfd_create(0x0, 0x9) 12:15:57 executing program 3: semctl$SETVAL(0x0, 0x0, 0x10, 0x0) [ 132.776245] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 132.842463] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 12:15:57 executing program 3: semctl$SETVAL(0x0, 0x0, 0x10, 0x0) 12:15:57 executing program 0: mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3) mlock(&(0x7f0000fed000/0x13000)=nil, 0x13000) 12:15:57 executing program 5: memfd_create(0x0, 0x9) 12:15:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0xfffffffffffffffc, 0x0) 12:15:57 executing program 1: clock_adjtime(0x0, &(0x7f0000000500)={0xfff, 0x0, 0xfffffffffffffff9}) clock_adjtime(0x0, &(0x7f0000000a80)={0x7}) 12:15:57 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/cgroups\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000200)=""/231, 0xe7}], 0x1, 0x4, 0x0) 12:15:57 executing program 5: memfd_create(0x0, 0x9) 12:15:57 executing program 1: clock_adjtime(0x0, &(0x7f0000000500)={0xfff, 0x0, 0xfffffffffffffff9}) clock_adjtime(0x0, &(0x7f0000000a80)={0x7}) 12:15:57 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/cgroups\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000200)=""/231, 0xe7}], 0x1, 0x4, 0x0) 12:15:57 executing program 7: clock_adjtime(0x0, &(0x7f0000000500)={0xfff, 0x0, 0xfffffffffffffff9}) clock_adjtime(0x0, &(0x7f0000000a80)={0x7}) 12:15:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0xfffffffffffffffc, 0x0) 12:15:57 executing program 0: mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3) mlock(&(0x7f0000fed000/0x13000)=nil, 0x13000) [ 132.991674] syz-executor.2 uses obsolete (PF_INET,SOCK_PACKET) [ 133.011982] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 133.012660] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 12:15:57 executing program 7: clock_adjtime(0x0, &(0x7f0000000500)={0xfff, 0x0, 0xfffffffffffffff9}) clock_adjtime(0x0, &(0x7f0000000a80)={0x7}) 12:15:57 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @loopback}, {0x0, @multicast}, 0x4e, {0x2, 0x0, @multicast2}}) 12:15:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x3, 0x2, 0x101}, 0x14}}, 0x0) recvmmsg(r1, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 12:15:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x50, 0x2, 0x1, 0x401, 0x0, 0x0, {0xa}, [@CTA_TUPLE_ORIG={0x3c, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private0}, {0xfffffffffffffeeb, 0x4, @mcast1}}}]}]}, 0x50}}, 0x0) 12:15:57 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @loopback}, {0x0, @multicast}, 0x4e, {0x2, 0x0, @multicast2}}) 12:15:57 executing program 1: clock_adjtime(0x0, &(0x7f0000000500)={0xfff, 0x0, 0xfffffffffffffff9}) clock_adjtime(0x0, &(0x7f0000000a80)={0x7}) 12:15:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') pread64(r2, &(0x7f0000000180)=""/234, 0xea, 0x5) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x28, r1, 0x87d27e71721737b5, 0x0, 0x0, {{0x6b}, {@void, @val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 12:15:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x50, 0x2, 0x1, 0x401, 0x0, 0x0, {0xa}, [@CTA_TUPLE_ORIG={0x3c, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private0}, {0xfffffffffffffeeb, 0x4, @mcast1}}}]}]}, 0x50}}, 0x0) 12:15:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x3, 0x2, 0x101}, 0x14}}, 0x0) recvmmsg(r1, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 12:15:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0xfffffffffffffffc, 0x0) 12:15:57 executing program 7: clock_adjtime(0x0, &(0x7f0000000500)={0xfff, 0x0, 0xfffffffffffffff9}) clock_adjtime(0x0, &(0x7f0000000a80)={0x7}) 12:15:57 executing program 0: mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3) mlock(&(0x7f0000fed000/0x13000)=nil, 0x13000) 12:15:57 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @loopback}, {0x0, @multicast}, 0x4e, {0x2, 0x0, @multicast2}}) 12:15:57 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x161941, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./file1\x00', 0x0) [ 133.135191] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 133.135891] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 12:15:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x3, 0x2, 0x101}, 0x14}}, 0x0) recvmmsg(r1, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 12:15:57 executing program 7: r0 = gettid() r1 = gettid() kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, 0xffffffffffffffff, 0x0) 12:15:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x50, 0x2, 0x1, 0x401, 0x0, 0x0, {0xa}, [@CTA_TUPLE_ORIG={0x3c, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private0}, {0xfffffffffffffeeb, 0x4, @mcast1}}}]}]}, 0x50}}, 0x0) [ 133.227645] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 133.228682] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 12:15:57 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @loopback}, {0x0, @multicast}, 0x4e, {0x2, 0x0, @multicast2}}) 12:15:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') pread64(r2, &(0x7f0000000180)=""/234, 0xea, 0x5) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x28, r1, 0x87d27e71721737b5, 0x0, 0x0, {{0x6b}, {@void, @val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 12:15:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0xfffffffffffffffc, 0x0) 12:15:57 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') pread64(r2, &(0x7f0000000180)=""/234, 0xea, 0x5) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x28, r1, 0x87d27e71721737b5, 0x0, 0x0, {{0x6b}, {@void, @val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 12:15:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x3, 0x2, 0x101}, 0x14}}, 0x0) recvmmsg(r1, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 12:15:57 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x161941, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./file1\x00', 0x0) 12:15:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x50, 0x2, 0x1, 0x401, 0x0, 0x0, {0xa}, [@CTA_TUPLE_ORIG={0x3c, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private0}, {0xfffffffffffffeeb, 0x4, @mcast1}}}]}]}, 0x50}}, 0x0) 12:15:57 executing program 7: r0 = gettid() r1 = gettid() kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, 0xffffffffffffffff, 0x0) [ 133.306096] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 133.306759] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 12:15:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') pread64(r2, &(0x7f0000000180)=""/234, 0xea, 0x5) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x28, r1, 0x87d27e71721737b5, 0x0, 0x0, {{0x6b}, {@void, @val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 12:15:57 executing program 3: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, '\x00', [{}, {0x0, 0x0, 0x0, 0x80}]}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)={0x28, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@mon_options=[@NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa}]]}, 0x28}}, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x29, 0x0, &(0x7f0000000000)=0x28) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) 12:15:57 executing program 7: r0 = gettid() r1 = gettid() kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, 0xffffffffffffffff, 0x0) 12:15:57 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') pread64(r2, &(0x7f0000000180)=""/234, 0xea, 0x5) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x28, r1, 0x87d27e71721737b5, 0x0, 0x0, {{0x6b}, {@void, @val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 12:15:57 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x161941, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./file1\x00', 0x0) 12:15:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000280)={0x1c, 0x5a, 0x1, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x2, 0x0, 0x0, @binary="5fc27faa"}]}]}, 0x1c}], 0x1}, 0x0) 12:15:57 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:15:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') pread64(r2, &(0x7f0000000180)=""/234, 0xea, 0x5) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x28, r1, 0x87d27e71721737b5, 0x0, 0x0, {{0x6b}, {@void, @val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 12:15:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e3, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000080)={0x10}) 12:15:57 executing program 7: r0 = gettid() r1 = gettid() kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, 0xffffffffffffffff, 0x0) [ 133.455291] EXT4-fs warning (device sda): verify_group_input:174: Bad blocks count 0 12:15:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000280)={0x1c, 0x5a, 0x1, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x2, 0x0, 0x0, @binary="5fc27faa"}]}]}, 0x1c}], 0x1}, 0x0) 12:15:57 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') pread64(r2, &(0x7f0000000180)=""/234, 0xea, 0x5) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x28, r1, 0x87d27e71721737b5, 0x0, 0x0, {{0x6b}, {@void, @val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 12:15:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001480)={ VM DIAGNOSIS: 12:15:54 Registers: info registers vcpu 0 RAX=0000000000000039 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b3251 RDI=ffffffff87641ba0 RBP=ffffffff87641b60 RSP=ffff8880410af698 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000039 R11=0000000000000001 R12=0000000000000039 R13=ffffffff87641b60 R14=0000000000000010 R15=ffffffff822b3240 RIP=ffffffff822b32a9 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f5002598700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffe046a4fc8 CR3=000000003f5e2000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f50051097c0 00007f50051097c8 YMM02=0000000000000000 0000000000000000 00007f50051097e0 00007f50051097c0 YMM03=0000000000000000 0000000000000000 00007f50051097c8 00007f50051097c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=0000000000000001 RCX=ffffffff842640c7 RDX=ffffed100d9c6f99 RSI=0000000000000004 RDI=ffff88806ce37cc0 RBP=ffff88806ce37cc0 RSP=ffff88804103fa98 R8 =0000000000000000 R9 =ffff88806ce37cc3 R10=ffffed100d9c6f98 R11=0000000000000001 R12=0000000000000003 R13=ffffed100d9c6f98 R14=0000000000000001 R15=1ffff11008207f54 RIP=ffffffff84264144 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000555557199400 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000055555719ac18 CR3=000000003fae2000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007fc7b8ad17c0 00007fc7b8ad17c8 YMM02=0000000000000000 0000000000000000 00007fc7b8ad17e0 00007fc7b8ad17c0 YMM03=0000000000000000 0000000000000000 00007fc7b8ad17c8 00007fc7b8ad17c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000