Warning: Permanently added '[localhost]:23026' (ECDSA) to the list of known hosts. 2022/09/21 14:10:36 fuzzer started 2022/09/21 14:10:37 dialing manager at localhost:40289 syzkaller login: [ 41.130963] cgroup: Unknown subsys name 'net' [ 41.233450] cgroup: Unknown subsys name 'rlimit' 2022/09/21 14:10:50 syscalls: 2215 2022/09/21 14:10:50 code coverage: enabled 2022/09/21 14:10:50 comparison tracing: enabled 2022/09/21 14:10:50 extra coverage: enabled 2022/09/21 14:10:50 setuid sandbox: enabled 2022/09/21 14:10:50 namespace sandbox: enabled 2022/09/21 14:10:50 Android sandbox: enabled 2022/09/21 14:10:50 fault injection: enabled 2022/09/21 14:10:50 leak checking: enabled 2022/09/21 14:10:50 net packet injection: enabled 2022/09/21 14:10:50 net device setup: enabled 2022/09/21 14:10:50 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/21 14:10:50 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/21 14:10:50 USB emulation: enabled 2022/09/21 14:10:50 hci packet injection: enabled 2022/09/21 14:10:50 wifi device emulation: failed to parse kernel version (6.0.0-rc6-next-20220921) 2022/09/21 14:10:50 802.15.4 emulation: enabled 2022/09/21 14:10:50 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/21 14:10:51 fetching corpus: 50, signal 28540/31942 (executing program) 2022/09/21 14:10:51 fetching corpus: 100, signal 47043/51607 (executing program) 2022/09/21 14:10:51 fetching corpus: 150, signal 55691/61438 (executing program) 2022/09/21 14:10:51 fetching corpus: 200, signal 59206/66248 (executing program) 2022/09/21 14:10:51 fetching corpus: 250, signal 65635/73671 (executing program) 2022/09/21 14:10:51 fetching corpus: 300, signal 73592/82533 (executing program) 2022/09/21 14:10:51 fetching corpus: 350, signal 77640/87558 (executing program) 2022/09/21 14:10:52 fetching corpus: 400, signal 82123/92936 (executing program) 2022/09/21 14:10:52 fetching corpus: 450, signal 86758/98338 (executing program) 2022/09/21 14:10:52 fetching corpus: 500, signal 89493/101961 (executing program) 2022/09/21 14:10:52 fetching corpus: 550, signal 92994/106198 (executing program) 2022/09/21 14:10:52 fetching corpus: 600, signal 95098/109133 (executing program) 2022/09/21 14:10:52 fetching corpus: 650, signal 98775/113330 (executing program) 2022/09/21 14:10:52 fetching corpus: 700, signal 101124/116333 (executing program) 2022/09/21 14:10:53 fetching corpus: 750, signal 102870/118810 (executing program) 2022/09/21 14:10:53 fetching corpus: 800, signal 104697/121356 (executing program) 2022/09/21 14:10:53 fetching corpus: 850, signal 107705/124816 (executing program) 2022/09/21 14:10:53 fetching corpus: 900, signal 109630/127357 (executing program) 2022/09/21 14:10:53 fetching corpus: 950, signal 112526/130632 (executing program) 2022/09/21 14:10:53 fetching corpus: 1000, signal 113919/132651 (executing program) 2022/09/21 14:10:53 fetching corpus: 1050, signal 115848/135062 (executing program) 2022/09/21 14:10:53 fetching corpus: 1100, signal 117610/137289 (executing program) 2022/09/21 14:10:53 fetching corpus: 1150, signal 118874/139116 (executing program) 2022/09/21 14:10:54 fetching corpus: 1200, signal 120697/141346 (executing program) 2022/09/21 14:10:54 fetching corpus: 1250, signal 122704/143651 (executing program) 2022/09/21 14:10:54 fetching corpus: 1300, signal 124564/145903 (executing program) 2022/09/21 14:10:54 fetching corpus: 1350, signal 126463/148164 (executing program) 2022/09/21 14:10:54 fetching corpus: 1400, signal 128758/150536 (executing program) 2022/09/21 14:10:54 fetching corpus: 1450, signal 130597/152597 (executing program) 2022/09/21 14:10:54 fetching corpus: 1500, signal 132145/154350 (executing program) 2022/09/21 14:10:54 fetching corpus: 1550, signal 133650/156058 (executing program) 2022/09/21 14:10:54 fetching corpus: 1600, signal 135427/158012 (executing program) 2022/09/21 14:10:55 fetching corpus: 1650, signal 137208/159943 (executing program) 2022/09/21 14:10:55 fetching corpus: 1700, signal 139183/161932 (executing program) 2022/09/21 14:10:55 fetching corpus: 1750, signal 140660/163517 (executing program) 2022/09/21 14:10:55 fetching corpus: 1800, signal 141751/164903 (executing program) 2022/09/21 14:10:55 fetching corpus: 1850, signal 143055/166325 (executing program) 2022/09/21 14:10:55 fetching corpus: 1900, signal 144161/167559 (executing program) 2022/09/21 14:10:55 fetching corpus: 1950, signal 145236/168747 (executing program) 2022/09/21 14:10:55 fetching corpus: 2000, signal 146915/170279 (executing program) 2022/09/21 14:10:56 fetching corpus: 2050, signal 149233/172177 (executing program) 2022/09/21 14:10:56 fetching corpus: 2100, signal 151243/173894 (executing program) 2022/09/21 14:10:56 fetching corpus: 2150, signal 152498/175090 (executing program) 2022/09/21 14:10:56 fetching corpus: 2200, signal 153772/176280 (executing program) 2022/09/21 14:10:56 fetching corpus: 2250, signal 154407/177126 (executing program) 2022/09/21 14:10:56 fetching corpus: 2300, signal 155762/178338 (executing program) 2022/09/21 14:10:56 fetching corpus: 2350, signal 157174/179574 (executing program) 2022/09/21 14:10:56 fetching corpus: 2400, signal 158901/180963 (executing program) 2022/09/21 14:10:57 fetching corpus: 2450, signal 160388/182115 (executing program) 2022/09/21 14:10:57 fetching corpus: 2500, signal 161654/183202 (executing program) 2022/09/21 14:10:57 fetching corpus: 2550, signal 163071/184312 (executing program) 2022/09/21 14:10:57 fetching corpus: 2600, signal 164656/185498 (executing program) 2022/09/21 14:10:57 fetching corpus: 2650, signal 165678/186359 (executing program) 2022/09/21 14:10:57 fetching corpus: 2700, signal 166223/187013 (executing program) 2022/09/21 14:10:57 fetching corpus: 2750, signal 166713/187640 (executing program) 2022/09/21 14:10:57 fetching corpus: 2800, signal 167489/188337 (executing program) 2022/09/21 14:10:58 fetching corpus: 2850, signal 168869/189270 (executing program) 2022/09/21 14:10:58 fetching corpus: 2900, signal 169722/190007 (executing program) 2022/09/21 14:10:58 fetching corpus: 2950, signal 170345/190557 (executing program) 2022/09/21 14:10:58 fetching corpus: 3000, signal 170997/191116 (executing program) 2022/09/21 14:10:58 fetching corpus: 3050, signal 172769/192329 (executing program) 2022/09/21 14:10:58 fetching corpus: 3100, signal 173505/192896 (executing program) 2022/09/21 14:10:58 fetching corpus: 3150, signal 174485/193534 (executing program) 2022/09/21 14:10:59 fetching corpus: 3200, signal 175843/194269 (executing program) 2022/09/21 14:10:59 fetching corpus: 3250, signal 177099/194966 (executing program) 2022/09/21 14:10:59 fetching corpus: 3300, signal 177554/195404 (executing program) 2022/09/21 14:10:59 fetching corpus: 3350, signal 178350/195921 (executing program) 2022/09/21 14:10:59 fetching corpus: 3400, signal 179125/196427 (executing program) 2022/09/21 14:10:59 fetching corpus: 3450, signal 180014/196930 (executing program) 2022/09/21 14:10:59 fetching corpus: 3500, signal 180677/197376 (executing program) 2022/09/21 14:10:59 fetching corpus: 3550, signal 181546/197839 (executing program) 2022/09/21 14:10:59 fetching corpus: 3600, signal 182281/198257 (executing program) 2022/09/21 14:11:00 fetching corpus: 3650, signal 182787/198617 (executing program) 2022/09/21 14:11:00 fetching corpus: 3700, signal 183436/198964 (executing program) 2022/09/21 14:11:00 fetching corpus: 3750, signal 184171/199338 (executing program) 2022/09/21 14:11:00 fetching corpus: 3800, signal 185295/199787 (executing program) 2022/09/21 14:11:00 fetching corpus: 3850, signal 186043/200157 (executing program) 2022/09/21 14:11:00 fetching corpus: 3900, signal 186961/200554 (executing program) 2022/09/21 14:11:00 fetching corpus: 3950, signal 188102/200912 (executing program) 2022/09/21 14:11:00 fetching corpus: 4000, signal 188793/201178 (executing program) 2022/09/21 14:11:01 fetching corpus: 4050, signal 189700/201487 (executing program) 2022/09/21 14:11:01 fetching corpus: 4100, signal 190601/201774 (executing program) 2022/09/21 14:11:01 fetching corpus: 4150, signal 191344/202024 (executing program) 2022/09/21 14:11:01 fetching corpus: 4200, signal 192182/202323 (executing program) 2022/09/21 14:11:01 fetching corpus: 4250, signal 192663/202506 (executing program) 2022/09/21 14:11:01 fetching corpus: 4300, signal 193177/202701 (executing program) 2022/09/21 14:11:01 fetching corpus: 4350, signal 193923/202886 (executing program) 2022/09/21 14:11:01 fetching corpus: 4400, signal 194576/203053 (executing program) 2022/09/21 14:11:01 fetching corpus: 4450, signal 195367/203223 (executing program) 2022/09/21 14:11:02 fetching corpus: 4500, signal 196001/203376 (executing program) 2022/09/21 14:11:02 fetching corpus: 4550, signal 196492/203586 (executing program) 2022/09/21 14:11:02 fetching corpus: 4600, signal 197429/203929 (executing program) 2022/09/21 14:11:02 fetching corpus: 4650, signal 198028/204046 (executing program) 2022/09/21 14:11:02 fetching corpus: 4700, signal 198606/204159 (executing program) 2022/09/21 14:11:02 fetching corpus: 4726, signal 199077/204333 (executing program) 2022/09/21 14:11:02 fetching corpus: 4726, signal 199077/204393 (executing program) 2022/09/21 14:11:02 fetching corpus: 4726, signal 199077/204398 (executing program) 2022/09/21 14:11:02 fetching corpus: 4726, signal 199077/204398 (executing program) 2022/09/21 14:11:05 starting 8 fuzzer processes 14:11:05 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) mount_setattr(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)={0x0, 0x0, 0x20000}, 0x20) 14:11:05 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) 14:11:05 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) bind$inet(r0, &(0x7f0000000040)={0x2, 0xe20, @empty}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4620, @multicast2}, 0x10) 14:11:05 executing program 3: syz_open_dev$mouse(&(0x7f0000000100), 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000740), 0xffffffffffffffff) 14:11:05 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x81}, {0x6}]}) [ 69.590923] audit: type=1400 audit(1663769465.701:6): avc: denied { execmem } for pid=286 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 14:11:05 executing program 5: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) r0 = openat2(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x440}, 0x18) mmap$IORING_OFF_SQ_RING(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) 14:11:05 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000000)='devpts\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0, 0x460, &(0x7f00000005c0)={[{@mode}]}) 14:11:05 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r0, 0x4bfb, &(0x7f0000000380)=""/98) [ 70.953919] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 70.956268] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 70.958366] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 70.960458] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 70.962506] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 70.963979] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 70.967753] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 70.968766] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 70.971854] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 70.980757] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 70.982002] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 70.983248] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 70.985033] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 70.991734] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 70.993707] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 70.995714] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 70.998792] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 70.999914] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 71.001045] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 71.002245] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 71.004498] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 71.006021] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 71.007516] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 71.009287] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 71.009306] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 71.012153] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 71.012181] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 71.013755] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 71.015358] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 71.015911] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 71.020074] Bluetooth: hci3: HCI_REQ-0x0c1a [ 71.021528] Bluetooth: hci2: HCI_REQ-0x0c1a [ 71.032316] Bluetooth: hci1: HCI_REQ-0x0c1a [ 71.033394] Bluetooth: hci0: HCI_REQ-0x0c1a [ 71.033584] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 71.045343] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 71.050805] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 71.057120] Bluetooth: hci5: HCI_REQ-0x0c1a [ 71.058075] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 71.069009] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 71.071100] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 71.072878] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 71.075833] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 71.077651] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 71.079091] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 71.084144] Bluetooth: hci4: HCI_REQ-0x0c1a [ 71.089481] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 71.092552] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 71.100581] Bluetooth: hci6: HCI_REQ-0x0c1a [ 73.076872] Bluetooth: hci5: command 0x0409 tx timeout [ 73.077531] Bluetooth: hci0: command 0x0409 tx timeout [ 73.077990] Bluetooth: hci1: command 0x0409 tx timeout [ 73.078495] Bluetooth: hci2: command 0x0409 tx timeout [ 73.078981] Bluetooth: hci3: command 0x0409 tx timeout [ 73.079639] Bluetooth: hci7: Opcode 0x c03 failed: -110 [ 73.140327] Bluetooth: hci6: command 0x0409 tx timeout [ 73.140992] Bluetooth: hci4: command 0x0409 tx timeout [ 75.124330] Bluetooth: hci3: command 0x041b tx timeout [ 75.124803] Bluetooth: hci2: command 0x041b tx timeout [ 75.125233] Bluetooth: hci1: command 0x041b tx timeout [ 75.125621] Bluetooth: hci0: command 0x041b tx timeout [ 75.126038] Bluetooth: hci5: command 0x041b tx timeout [ 75.188338] Bluetooth: hci4: command 0x041b tx timeout [ 75.188810] Bluetooth: hci6: command 0x041b tx timeout [ 76.012294] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 76.014760] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 76.016562] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 76.020659] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 76.022392] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 76.024148] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 76.032312] Bluetooth: hci7: HCI_REQ-0x0c1a [ 77.172294] Bluetooth: hci5: command 0x040f tx timeout [ 77.172397] Bluetooth: hci0: command 0x040f tx timeout [ 77.172757] Bluetooth: hci1: command 0x040f tx timeout [ 77.173381] Bluetooth: hci2: command 0x040f tx timeout [ 77.173784] Bluetooth: hci3: command 0x040f tx timeout [ 77.236268] Bluetooth: hci6: command 0x040f tx timeout [ 77.236337] Bluetooth: hci4: command 0x040f tx timeout [ 78.069274] Bluetooth: hci7: command 0x0409 tx timeout [ 79.220413] Bluetooth: hci2: command 0x0419 tx timeout [ 79.221254] Bluetooth: hci1: command 0x0419 tx timeout [ 79.221984] Bluetooth: hci0: command 0x0419 tx timeout [ 79.222757] Bluetooth: hci5: command 0x0419 tx timeout [ 79.223529] Bluetooth: hci3: command 0x0419 tx timeout [ 79.284313] Bluetooth: hci6: command 0x0419 tx timeout [ 79.285132] Bluetooth: hci4: command 0x0419 tx timeout [ 80.116362] Bluetooth: hci7: command 0x041b tx timeout [ 82.164385] Bluetooth: hci7: command 0x040f tx timeout [ 84.212325] Bluetooth: hci7: command 0x0419 tx timeout [ 126.456797] audit: type=1400 audit(1663769522.566:7): avc: denied { open } for pid=3781 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 126.458326] audit: type=1400 audit(1663769522.567:8): avc: denied { kernel } for pid=3781 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 126.510833] ------------[ cut here ]------------ [ 126.510866] [ 126.510869] ====================================================== [ 126.510874] WARNING: possible circular locking dependency detected [ 126.510879] 6.0.0-rc6-next-20220921 #1 Not tainted [ 126.510887] ------------------------------------------------------ [ 126.510890] syz-executor.0/3783 is trying to acquire lock: [ 126.510897] ffffffff853faab8 ((console_sem).lock){-...}-{2:2}, at: down_trylock+0xe/0x70 [ 126.510938] [ 126.510938] but task is already holding lock: [ 126.510941] ffff888008806420 (&ctx->lock){-...}-{2:2}, at: event_function+0x182/0x3d0 [ 126.510977] [ 126.510977] which lock already depends on the new lock. [ 126.510977] [ 126.510980] [ 126.510980] the existing dependency chain (in reverse order) is: [ 126.510985] [ 126.510985] -> #3 (&ctx->lock){-...}-{2:2}: [ 126.511000] _raw_spin_lock+0x2a/0x40 [ 126.511021] __perf_event_task_sched_out+0x53b/0x18d0 [ 126.511033] __schedule+0xedd/0x2470 [ 126.511048] schedule+0xda/0x1b0 [ 126.511062] futex_wait_queue+0xf5/0x1e0 [ 126.511073] futex_wait+0x28e/0x690 [ 126.511082] do_futex+0x2ff/0x380 [ 126.511091] __x64_sys_futex+0x1c6/0x4d0 [ 126.511100] do_syscall_64+0x3b/0x90 [ 126.511117] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 126.511128] [ 126.511128] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 126.511144] _raw_spin_lock_nested+0x30/0x40 [ 126.511162] raw_spin_rq_lock_nested+0x1e/0x30 [ 126.511175] task_fork_fair+0x63/0x4d0 [ 126.511196] sched_cgroup_fork+0x3d0/0x540 [ 126.511210] copy_process+0x4183/0x6e20 [ 126.511222] kernel_clone+0xe7/0x890 [ 126.511233] user_mode_thread+0xad/0xf0 [ 126.511243] rest_init+0x24/0x250 [ 126.511254] arch_call_rest_init+0xf/0x14 [ 126.511270] start_kernel+0x4c1/0x4e6 [ 126.511283] secondary_startup_64_no_verify+0xe0/0xeb [ 126.511298] [ 126.511298] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 126.511314] _raw_spin_lock_irqsave+0x39/0x60 [ 126.511332] try_to_wake_up+0xab/0x1930 [ 126.511345] up+0x75/0xb0 [ 126.511358] __up_console_sem+0x6e/0x80 [ 126.511374] console_unlock+0x46a/0x590 [ 126.511392] vprintk_emit+0x1bd/0x560 [ 126.511410] vprintk+0x84/0xa0 [ 126.511426] _printk+0xba/0xf1 [ 126.511437] kauditd_hold_skb.cold+0x3f/0x4e [ 126.511453] kauditd_send_queue+0x233/0x290 [ 126.511468] kauditd_thread+0x5da/0x9a0 [ 126.511484] kthread+0x2ed/0x3a0 [ 126.511500] ret_from_fork+0x22/0x30 [ 126.511512] [ 126.511512] -> #0 ((console_sem).lock){-...}-{2:2}: [ 126.511526] __lock_acquire+0x2a02/0x5e70 [ 126.511543] lock_acquire+0x1a2/0x530 [ 126.511560] _raw_spin_lock_irqsave+0x39/0x60 [ 126.511581] down_trylock+0xe/0x70 [ 126.511594] __down_trylock_console_sem+0x3b/0xd0 [ 126.511610] vprintk_emit+0x16b/0x560 [ 126.511626] vprintk+0x84/0xa0 [ 126.511642] _printk+0xba/0xf1 [ 126.511653] report_bug.cold+0x72/0xab [ 126.511670] handle_bug+0x3c/0x70 [ 126.511686] exc_invalid_op+0x14/0x50 [ 126.511702] asm_exc_invalid_op+0x16/0x20 [ 126.511712] perf_group_detach+0x99e/0x12f0 [ 126.511723] __perf_remove_from_context+0x71e/0xb20 [ 126.511737] event_function+0x297/0x3d0 [ 126.511755] remote_function+0x125/0x1b0 [ 126.511770] __flush_smp_call_function_queue+0x1df/0x5a0 [ 126.511781] __sysvec_call_function_single+0x92/0x3a0 [ 126.511799] sysvec_call_function_single+0x89/0xc0 [ 126.511809] asm_sysvec_call_function_single+0x16/0x20 [ 126.511823] unwind_next_frame+0xcfb/0x20b0 [ 126.511842] arch_stack_walk+0x83/0xf0 [ 126.511860] stack_trace_save+0x8c/0xc0 [ 126.511876] __create_object+0x389/0xc10 [ 126.511888] kmemleak_alloc_percpu+0xa4/0x150 [ 126.511900] pcpu_alloc+0x801/0x1100 [ 126.511921] __percpu_init_rwsem+0x22/0x150 [ 126.511936] alloc_super+0x27b/0xb00 [ 126.511946] sget_fc+0x13e/0x7a0 [ 126.511957] get_tree_nodev+0x24/0x1d0 [ 126.511968] vfs_get_tree+0x8e/0x300 [ 126.511977] path_mount+0x1310/0x1e20 [ 126.511988] __x64_sys_mount+0x282/0x300 [ 126.512002] do_syscall_64+0x3b/0x90 [ 126.512018] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 126.512029] [ 126.512029] other info that might help us debug this: [ 126.512029] [ 126.512032] Chain exists of: [ 126.512032] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 126.512032] [ 126.512047] Possible unsafe locking scenario: [ 126.512047] [ 126.512050] CPU0 CPU1 [ 126.512052] ---- ---- [ 126.512055] lock(&ctx->lock); [ 126.512060] lock(&rq->__lock); [ 126.512067] lock(&ctx->lock); [ 126.512073] lock((console_sem).lock); [ 126.512080] [ 126.512080] *** DEADLOCK *** [ 126.512080] [ 126.512083] 3 locks held by syz-executor.0/3783: [ 126.512091] #0: ffff88803dba60e0 (&type->s_umount_key/1){+.+.}-{3:3}, at: alloc_super+0x22e/0xb00 [ 126.512120] #1: ffff88806cf3d160 (&cpuctx_lock){-...}-{2:2}, at: event_function+0x16f/0x3d0 [ 126.512151] #2: ffff888008806420 (&ctx->lock){-...}-{2:2}, at: event_function+0x182/0x3d0 [ 126.512185] [ 126.512185] stack backtrace: [ 126.512188] CPU: 1 PID: 3783 Comm: syz-executor.0 Not tainted 6.0.0-rc6-next-20220921 #1 [ 126.512200] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 126.512209] Call Trace: [ 126.512212] [ 126.512234] dump_stack_lvl+0x8b/0xb3 [ 126.512253] check_noncircular+0x263/0x2e0 [ 126.512270] ? format_decode+0x26c/0xb50 [ 126.512286] ? print_circular_bug+0x450/0x450 [ 126.512303] ? enable_ptr_key_workfn+0x20/0x20 [ 126.512321] ? format_decode+0x26c/0xb50 [ 126.512338] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 126.512356] __lock_acquire+0x2a02/0x5e70 [ 126.512379] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 126.512401] ? __mutex_add_waiter+0x120/0x120 [ 126.512420] lock_acquire+0x1a2/0x530 [ 126.512437] ? down_trylock+0xe/0x70 [ 126.512453] ? lock_release+0x750/0x750 [ 126.512474] ? mark_lock.part.0+0xef/0x2f70 [ 126.512494] ? vprintk+0x84/0xa0 [ 126.512513] _raw_spin_lock_irqsave+0x39/0x60 [ 126.512531] ? down_trylock+0xe/0x70 [ 126.512546] down_trylock+0xe/0x70 [ 126.512563] ? vprintk+0x84/0xa0 [ 126.512582] __down_trylock_console_sem+0x3b/0xd0 [ 126.512599] vprintk_emit+0x16b/0x560 [ 126.512619] vprintk+0x84/0xa0 [ 126.512636] _printk+0xba/0xf1 [ 126.512649] ? record_print_text.cold+0x16/0x16 [ 126.512664] ? __lock_acquire+0x164d/0x5e70 [ 126.512683] ? report_bug.cold+0x66/0xab [ 126.512700] ? perf_group_detach+0x99e/0x12f0 [ 126.512713] report_bug.cold+0x72/0xab [ 126.512733] handle_bug+0x3c/0x70 [ 126.512751] exc_invalid_op+0x14/0x50 [ 126.512768] asm_exc_invalid_op+0x16/0x20 [ 126.512780] RIP: 0010:perf_group_detach+0x99e/0x12f0 [ 126.512794] Code: 85 d5 f8 ff ff e8 a2 59 ee ff 65 44 8b 25 36 b2 aa 7e 31 ff 44 89 e6 e8 40 56 ee ff 45 85 e4 0f 84 0a 05 00 00 e8 82 59 ee ff <0f> 0b e9 a9 f8 ff ff e8 76 59 ee ff 65 8b 1d 0b b2 aa 7e 31 ff 89 [ 126.512805] RSP: 0018:ffff88806cf09e60 EFLAGS: 00010046 [ 126.512815] RAX: 0000000080010003 RBX: ffff88803deb05c8 RCX: 0000000000000000 [ 126.512824] RDX: ffff88801b6e5040 RSI: ffffffff8157c39e RDI: 0000000000000005 [ 126.512834] RBP: ffff88803deb05c8 R08: 0000000000000005 R09: 0000000000000001 [ 126.512841] R10: 0000000000000000 R11: ffffffff865b005b R12: 0000000000000000 [ 126.512848] R13: ffff88803deb0658 R14: ffff888008806400 R15: ffff88803deb05c8 [ 126.512860] ? perf_group_detach+0x99e/0x12f0 [ 126.512876] ? event_sched_out+0xd8/0xcd0 [ 126.512889] __perf_remove_from_context+0x71e/0xb20 [ 126.512907] event_function+0x297/0x3d0 [ 126.512926] ? perf_output_read+0xf80/0xf80 [ 126.512943] remote_function+0x125/0x1b0 [ 126.512960] __flush_smp_call_function_queue+0x1df/0x5a0 [ 126.512973] ? perf_duration_warn+0x40/0x40 [ 126.512993] __sysvec_call_function_single+0x92/0x3a0 [ 126.513012] sysvec_call_function_single+0x89/0xc0 [ 126.513024] [ 126.513026] [ 126.513030] asm_sysvec_call_function_single+0x16/0x20 [ 126.513043] RIP: 0010:unwind_next_frame+0xcfb/0x20b0 [ 126.513059] Code: 01 4c 89 c9 83 e1 07 38 ca 0f 9e c1 84 d2 0f 95 c2 84 d1 0f 85 8f 11 00 00 41 83 e7 07 44 38 f8 0f 9e c2 84 c0 0f 95 c0 84 c2 <0f> 85 78 11 00 00 41 0f b6 40 04 c0 e8 04 3c 01 0f 84 a3 07 00 00 [ 126.513069] RSP: 0018:ffff8880176bf980 EFLAGS: 00000246 [ 126.513080] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000001 [ 126.513088] RDX: 0000000000000001 RSI: ffff8880176bff58 RDI: ffff8880176bfa68 [ 126.513096] RBP: ffff8880176bfa42 R08: ffffffff8624400c R09: ffffffff86244010 [ 126.513104] R10: ffffed1002ed7f4d R11: 000000000003603d R12: ffff8880176bfa41 [ 126.513111] R13: ffff8880176bfa60 R14: ffff8880176bfa00 R15: 0000000000000001 [ 126.513126] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 126.513140] ? kernel_text_address+0xd/0xb0 [ 126.513152] ? write_profile+0x3b0/0x3b0 [ 126.513172] arch_stack_walk+0x83/0xf0 [ 126.513197] stack_trace_save+0x8c/0xc0 [ 126.513212] ? filter_irq_stacks+0x90/0x90 [ 126.513227] ? lockdep_init_map_type+0x21a/0x7e0 [ 126.513249] ? __raw_spin_lock_init+0x36/0x110 [ 126.513271] __create_object+0x389/0xc10 [ 126.513285] kmemleak_alloc_percpu+0xa4/0x150 [ 126.513301] pcpu_alloc+0x801/0x1100 [ 126.513324] __percpu_init_rwsem+0x22/0x150 [ 126.513343] alloc_super+0x27b/0xb00 [ 126.513358] sget_fc+0x13e/0x7a0 [ 126.513370] ? kill_litter_super+0xa0/0xa0 [ 126.513383] ? zero_user_segments.constprop.0+0x610/0x610 [ 126.513404] get_tree_nodev+0x24/0x1d0 [ 126.513418] vfs_get_tree+0x8e/0x300 [ 126.513432] path_mount+0x1310/0x1e20 [ 126.513445] ? kasan_quarantine_put+0x8b/0x1f0 [ 126.513459] ? finish_automount+0x8d0/0x8d0 [ 126.513473] ? putname+0xfe/0x140 [ 126.513487] __x64_sys_mount+0x282/0x300 [ 126.513499] ? path_mount+0x1e20/0x1e20 [ 126.513514] ? syscall_enter_from_user_mode+0x1d/0x50 [ 126.513531] do_syscall_64+0x3b/0x90 [ 126.513548] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 126.513560] RIP: 0033:0x7f6aa09f804a [ 126.513569] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 126.513580] RSP: 002b:00007f6a9df6bfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 126.513591] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6aa09f804a [ 126.513600] RDX: 0000000020000000 RSI: 0000000020000580 RDI: 0000000000000000 [ 126.513609] RBP: 00007f6a9df6c040 R08: 00007f6a9df6c040 R09: 0000000020000000 [ 126.513616] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 126.513623] R13: 0000000020000580 R14: 00007f6a9df6c000 R15: 0000000020000840 [ 126.513638] [ 126.592167] WARNING: CPU: 1 PID: 3783 at kernel/events/core.c:2047 perf_group_detach+0x99e/0x12f0 [ 126.592880] Modules linked in: [ 126.593138] CPU: 1 PID: 3783 Comm: syz-executor.0 Not tainted 6.0.0-rc6-next-20220921 #1 [ 126.593772] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 126.594606] RIP: 0010:perf_group_detach+0x99e/0x12f0 [ 126.595001] Code: 85 d5 f8 ff ff e8 a2 59 ee ff 65 44 8b 25 36 b2 aa 7e 31 ff 44 89 e6 e8 40 56 ee ff 45 85 e4 0f 84 0a 05 00 00 e8 82 59 ee ff <0f> 0b e9 a9 f8 ff ff e8 76 59 ee ff 65 8b 1d 0b b2 aa 7e 31 ff 89 [ 126.596514] RSP: 0018:ffff88806cf09e60 EFLAGS: 00010046 [ 126.596966] RAX: 0000000080010003 RBX: ffff88803deb05c8 RCX: 0000000000000000 [ 126.597549] RDX: ffff88801b6e5040 RSI: ffffffff8157c39e RDI: 0000000000000005 [ 126.598164] RBP: ffff88803deb05c8 R08: 0000000000000005 R09: 0000000000000001 [ 126.598697] R10: 0000000000000000 R11: ffffffff865b005b R12: 0000000000000000 [ 126.599257] R13: ffff88803deb0658 R14: ffff888008806400 R15: ffff88803deb05c8 [ 126.599837] FS: 00007f6a9df6c700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 126.600516] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 126.601027] CR2: 00007f6a9df6d000 CR3: 0000000019f92000 CR4: 0000000000350ee0 [ 126.601634] Call Trace: [ 126.601872] [ 126.602060] ? event_sched_out+0xd8/0xcd0 [ 126.602421] __perf_remove_from_context+0x71e/0xb20 [ 126.602857] event_function+0x297/0x3d0 [ 126.603182] ? perf_output_read+0xf80/0xf80 [ 126.603574] remote_function+0x125/0x1b0 [ 126.603932] __flush_smp_call_function_queue+0x1df/0x5a0 [ 126.604415] ? perf_duration_warn+0x40/0x40 [ 126.604811] __sysvec_call_function_single+0x92/0x3a0 [ 126.605265] sysvec_call_function_single+0x89/0xc0 [ 126.605701] [ 126.605903] [ 126.606114] asm_sysvec_call_function_single+0x16/0x20 [ 126.606567] RIP: 0010:unwind_next_frame+0xcfb/0x20b0 [ 126.607029] Code: 01 4c 89 c9 83 e1 07 38 ca 0f 9e c1 84 d2 0f 95 c2 84 d1 0f 85 8f 11 00 00 41 83 e7 07 44 38 f8 0f 9e c2 84 c0 0f 95 c0 84 c2 <0f> 85 78 11 00 00 41 0f b6 40 04 c0 e8 04 3c 01 0f 84 a3 07 00 00 [ 126.608513] RSP: 0018:ffff8880176bf980 EFLAGS: 00000246 [ 126.608973] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000001 [ 126.609564] RDX: 0000000000000001 RSI: ffff8880176bff58 RDI: ffff8880176bfa68 [ 126.610169] RBP: ffff8880176bfa42 R08: ffffffff8624400c R09: ffffffff86244010 [ 126.610745] R10: ffffed1002ed7f4d R11: 000000000003603d R12: ffff8880176bfa41 [ 126.611355] R13: ffff8880176bfa60 R14: ffff8880176bfa00 R15: 0000000000000001 [ 126.611939] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 126.612379] ? kernel_text_address+0xd/0xb0 [ 126.612711] ? write_profile+0x3b0/0x3b0 [ 126.613027] arch_stack_walk+0x83/0xf0 [ 126.613348] stack_trace_save+0x8c/0xc0 [ 126.613702] ? filter_irq_stacks+0x90/0x90 [ 126.614087] ? lockdep_init_map_type+0x21a/0x7e0 [ 126.614487] ? __raw_spin_lock_init+0x36/0x110 [ 126.614831] __create_object+0x389/0xc10 [ 126.615146] kmemleak_alloc_percpu+0xa4/0x150 [ 126.615515] pcpu_alloc+0x801/0x1100 [ 126.615815] __percpu_init_rwsem+0x22/0x150 [ 126.616147] alloc_super+0x27b/0xb00 [ 126.616491] sget_fc+0x13e/0x7a0 [ 126.616801] ? kill_litter_super+0xa0/0xa0 [ 126.617141] ? zero_user_segments.constprop.0+0x610/0x610 [ 126.617616] get_tree_nodev+0x24/0x1d0 [ 126.617967] vfs_get_tree+0x8e/0x300 [ 126.618298] path_mount+0x1310/0x1e20 [ 126.618619] ? kasan_quarantine_put+0x8b/0x1f0 [ 126.618972] ? finish_automount+0x8d0/0x8d0 [ 126.619306] ? putname+0xfe/0x140 [ 126.619585] __x64_sys_mount+0x282/0x300 [ 126.619892] ? path_mount+0x1e20/0x1e20 [ 126.620182] ? syscall_enter_from_user_mode+0x1d/0x50 [ 126.620649] do_syscall_64+0x3b/0x90 [ 126.620992] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 126.621450] RIP: 0033:0x7f6aa09f804a [ 126.621761] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 126.623265] RSP: 002b:00007f6a9df6bfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 126.623869] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6aa09f804a [ 126.624448] RDX: 0000000020000000 RSI: 0000000020000580 RDI: 0000000000000000 [ 126.625045] RBP: 00007f6a9df6c040 R08: 00007f6a9df6c040 R09: 0000000020000000 [ 126.625638] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 126.626184] R13: 0000000020000580 R14: 00007f6a9df6c000 R15: 0000000020000840 [ 126.626769] [ 126.626970] irq event stamp: 4034 [ 126.627256] hardirqs last enabled at (4033): [] ___slab_alloc+0x89f/0x10c0 [ 126.627996] hardirqs last disabled at (4034): [] sysvec_call_function_single+0xb/0xc0 [ 126.628737] softirqs last enabled at (3896): [] __irq_exit_rcu+0x11b/0x180 [ 126.629449] softirqs last disabled at (3849): [] __irq_exit_rcu+0x11b/0x180 [ 126.630152] ---[ end trace 0000000000000000 ]--- [ 127.717968] audit: type=1326 audit(1663769523.829:9): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=3864 comm="syz-executor.4" exe="/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7feafe855b19 code=0x0 [ 130.899969] ======================================================= [ 130.899969] WARNING: The mand mount option has been deprecated and [ 130.899969] and is ignored by this kernel. Remove the mand [ 130.899969] option from the mount to silence this warning. [ 130.899969] ======================================================= 14:12:07 executing program 0: syz_emit_ethernet(0x56, &(0x7f0000000200)={@multicast, @local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '#\x00\b', 0x20, 0x2c, 0x0, @empty, @local, {[@routing={0x88, 0x2, 0x0, 0x0, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}]}], {0x0, 0x0, 0x8}}}}}}, 0x0) 14:12:07 executing program 6: timer_create(0x0, 0x0, &(0x7f0000000400)) timer_create(0x0, &(0x7f0000000540)={0x0, 0x0, 0x7a3c61813f7a04e8}, 0x0) 14:12:07 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r0, 0x4bfb, &(0x7f0000000380)=""/98) 14:12:07 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) bind$inet(r0, &(0x7f0000000040)={0x2, 0xe20, @empty}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4620, @multicast2}, 0x10) 14:12:07 executing program 3: ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000015c0), 0x80, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) clone3(&(0x7f0000001900)={0x101010000, 0x0, 0x0, &(0x7f0000001740), {}, &(0x7f0000001780)=""/166, 0xa6, &(0x7f0000001840)=""/68, 0x0}, 0x58) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) accept(0xffffffffffffffff, &(0x7f0000002d40)=@can, &(0x7f0000002dc0)=0x80) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000002ec0)) 14:12:07 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) 14:12:07 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x81}, {0x6}]}) 14:12:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) bind$inet(r0, &(0x7f0000000040)={0x2, 0xe20, @empty}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4620, @multicast2}, 0x10) 14:12:07 executing program 0: syz_emit_ethernet(0x56, &(0x7f0000000200)={@multicast, @local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '#\x00\b', 0x20, 0x2c, 0x0, @empty, @local, {[@routing={0x88, 0x2, 0x0, 0x0, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}]}], {0x0, 0x0, 0x8}}}}}}, 0x0) [ 131.002085] audit: type=1326 audit(1663769527.113:10): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=3964 comm="syz-executor.4" exe="/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7feafe855b19 code=0x0 14:12:07 executing program 6: ioprio_set$pid(0x0, 0xffffffffffffffff, 0x6000) 14:12:07 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r0, 0x4bfb, &(0x7f0000000380)=""/98) 14:12:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) bind$inet(r0, &(0x7f0000000040)={0x2, 0xe20, @empty}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4620, @multicast2}, 0x10) 14:12:07 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) 14:12:07 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x81}, {0x6}]}) 14:12:07 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) bind$inet(r0, &(0x7f0000000040)={0x2, 0xe20, @empty}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4620, @multicast2}, 0x10) 14:12:07 executing program 3: ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000015c0), 0x80, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) clone3(&(0x7f0000001900)={0x101010000, 0x0, 0x0, &(0x7f0000001740), {}, &(0x7f0000001780)=""/166, 0xa6, &(0x7f0000001840)=""/68, 0x0}, 0x58) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) accept(0xffffffffffffffff, &(0x7f0000002d40)=@can, &(0x7f0000002dc0)=0x80) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000002ec0)) 14:12:07 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f00000001c0)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp\x00') preadv(r3, &(0x7f0000000180)=[{&(0x7f0000000000)=""/121, 0x79}, {&(0x7f0000000080)=""/121, 0x79}], 0x2, 0x0, 0x0) fdatasync(r3) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x200200, 0x4) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) r4 = socket$inet6(0xa, 0x1, 0x0) fchown(r4, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, &(0x7f0000000240), 0x4) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000480)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb}, 0x15182, 0x7, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r1, 0x0, 0xfffffdef) [ 131.156409] loop6: detected capacity change from 0 to 40 [ 131.168565] audit: type=1326 audit(1663769527.279:11): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=3980 comm="syz-executor.4" exe="/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7feafe855b19 code=0x0 14:12:07 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) bind$inet(r0, &(0x7f0000000040)={0x2, 0xe20, @empty}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4620, @multicast2}, 0x10) 14:12:07 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r0, 0x4bfb, &(0x7f0000000380)=""/98) [ 131.259884] syz-executor.6: attempt to access beyond end of device [ 131.259884] loop6: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 131.261131] Buffer I/O error on dev loop6, logical block 10, lost async page write [ 131.314234] syz-executor.6 (3981) used greatest stack depth: 24472 bytes left 14:12:07 executing program 0: syz_emit_ethernet(0x56, &(0x7f0000000200)={@multicast, @local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '#\x00\b', 0x20, 0x2c, 0x0, @empty, @local, {[@routing={0x88, 0x2, 0x0, 0x0, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}]}], {0x0, 0x0, 0x8}}}}}}, 0x0) 14:12:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) bind$inet(r0, &(0x7f0000000040)={0x2, 0xe20, @empty}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4620, @multicast2}, 0x10) 14:12:07 executing program 3: ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000015c0), 0x80, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) clone3(&(0x7f0000001900)={0x101010000, 0x0, 0x0, &(0x7f0000001740), {}, &(0x7f0000001780)=""/166, 0xa6, &(0x7f0000001840)=""/68, 0x0}, 0x58) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) accept(0xffffffffffffffff, &(0x7f0000002d40)=@can, &(0x7f0000002dc0)=0x80) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000002ec0)) 14:12:07 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x81}, {0x6}]}) 14:12:07 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) 14:12:07 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f00000001c0)={0x2}, 0x8, 0x0) msgrcv(r0, &(0x7f0000000000)={0x0, ""/203}, 0xd3, 0x0, 0x0) 14:12:07 executing program 7: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) 14:12:07 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f00000001c0)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp\x00') preadv(r3, &(0x7f0000000180)=[{&(0x7f0000000000)=""/121, 0x79}, {&(0x7f0000000080)=""/121, 0x79}], 0x2, 0x0, 0x0) fdatasync(r3) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x200200, 0x4) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) r4 = socket$inet6(0xa, 0x1, 0x0) fchown(r4, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, &(0x7f0000000240), 0x4) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000480)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb}, 0x15182, 0x7, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r1, 0x0, 0xfffffdef) [ 131.405021] audit: type=1326 audit(1663769527.516:12): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4009 comm="syz-executor.4" exe="/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7feafe855b19 code=0x0 [ 131.405957] loop6: detected capacity change from 0 to 40 [ 131.478964] syz-executor.6: attempt to access beyond end of device [ 131.478964] loop6: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 131.480243] Buffer I/O error on dev loop6, logical block 10, lost async page write [ 131.498212] hrtimer: interrupt took 19246 ns 14:12:07 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xdc800, 0x1e, &(0x7f0000000200)=[{&(0x7f0000010000)="00000000000000000000000000000000000000000000000000000000000000ffffff00ffffff000000000000000000ffffff00ffffff000000000000000000ffffff00ffffff000000000000000000ffffff00ffffff000000000000000055aa", 0x60, 0x1a0}, {&(0x7f0000010100)="4244db8cf0c2db8cf0c2818000060003003501b800000800000020000004000000180000054344524f4d000000000000000000000000000000000000000000000000000000000000006b000060000000c00000010000000700000001000000000000000000000000000000000000000000000000000000000000000000000000000000006000018f000c00000000000000000000c000019b0018000000000000", 0xa0, 0x400}, {&(0x7f0000010200)="ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x200, 0x600}, {&(0x7f0000010400)="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"/1408, 0x580, 0x8000}, {&(0x7f0000010a00)="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"/1408, 0x580, 0x8800}, {&(0x7f0000011000)="ff43443030310100"/32, 0x20, 0x9000}, {&(0x7f0000011100)="01001c0000000100000005001d000000010046494c4530000000000000000000", 0x20, 0xa000}, {&(0x7f0000011200)="01000000001c0001000005000000001d000146494c4530000000000000000000", 0x20, 0xb000}, {&(0x7f0000011300)="01001e000000010000000a001f000000010000660069006c0065003000000000", 0x20, 0xc000}, {&(0x7f0000011400)="01000000001e000100000a000000001f000100660069006c0065003000000000", 0x20, 0xd000}, {&(0x7f0000011500)="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"/288, 0x120, 0xe000}, {&(0x7f0000011700)="22001d0000000000001d00080000000008007809140b2a3a0802000001000001010022001c0000000000001c00080000000008007809140b2a3a080200000100000101012a002c0000000000002c1a0400000000041a7809140b2a3a08000000010000010846494c45302e3b3100"/128, 0x80, 0xe800}, {&(0x7f0000011800)="22001e0000000000001e00080000000008007809140b2a3a0802000001000001010022001e0000000000001e00080000000008007809140b2a3a080200000100000101013400200000000000002064000000000000647809140b2a3a08000000010000011200660069006c0065002e0063006f006c0064002c001f0000000000001f00080000000008007809140b2a3a08020000010000010a00660069006c00650030002c0021000000000000210a0000000000000a7809140b2a3a08000000010000010a00660069006c00650031002c00220000000000002228230000000023287809140b2a3a08000000010000010a00660069006c00650032002c00270000000000002728230000000023287809140b2a3a08000000010000010a00660069006c0065003300"/320, 0x140, 0xf000}, {&(0x7f0000011a00)="22001f0000000000001f00080000000008007809140b2a3a0802000001000001010022001e0000000000001e00080000000008007809140b2a3a080200000100000101012c002c0000000000002c1a0400000000041a7809140b2a3a08000000010000010a00660069006c0065003000"/128, 0x80, 0xf800}, {&(0x7f0000011b00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x10000}, {&(0x7f0000011c00)='syzkallers\x00'/32, 0x20, 0x10800}, {&(0x7f0000011d00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x16000}, {&(0x7f0000012200)="000000000000000001000003000000000000000000000000000000000000000002000007000000300000002f00"/64, 0x40, 0xc8000}, {&(0x7f0000012300)="0000000000000000000000000000000000000000000000008000000000000000", 0x20, 0xc80e0}, {&(0x7f0000012400)="00000000000000000000000000000000000000000000000001f800f80078000e", 0x20, 0xc81e0}, {&(0x7f0000012500)="00000000000000000100000300000002000000030000000b000000010000000402000025000000600000005b00"/64, 0x40, 0xce000}, {&(0x7f0000012600)="000000000000000000000000000000000000000000000000f800000000000000", 0x20, 0xce0e0}, {&(0x7f0000012700)="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"/1216, 0x4c0, 0xce1e0}, {&(0x7f0000012c00)="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", 0x220, 0xce7e0}, {&(0x7f0000012f00)="00000000000000000000000000000000000000000000000041e1000000000000", 0x20, 0xcfbc0}, {&(0x7f0000013000)="000000000000000001000003000000000000000000000000000000000000000002000025000000100000000f00000000200000ff00"/64, 0x40, 0xda000}, {&(0x7f0000013100)="000000000000000000000000000000000000000000000000020a010000000000", 0x20, 0xda060}, {&(0x7f0000013200)="0000000000000000000000000000000000000000000000008000000000000000", 0x20, 0xda0e0}, {&(0x7f0000013300)="00000000000000000000000000000000000000000000000001f800f80078000e", 0x20, 0xda1e0}, {&(0x7f0000013400)="4244db8cf0c2db8cf0c2010000000003002401b800000800000020000004000000100194054344524f4d0000000000000000000000000000000000000000000000000000000000000005000060000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000c00000000000000000000c000000c0018000000000000", 0xa0, 0xdc000}], 0x0, &(0x7f0000013500)) 14:12:07 executing program 3: ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000015c0), 0x80, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) clone3(&(0x7f0000001900)={0x101010000, 0x0, 0x0, &(0x7f0000001740), {}, &(0x7f0000001780)=""/166, 0xa6, &(0x7f0000001840)=""/68, 0x0}, 0x58) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) accept(0xffffffffffffffff, &(0x7f0000002d40)=@can, &(0x7f0000002dc0)=0x80) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000002ec0)) 14:12:07 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f00000001c0)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp\x00') preadv(r3, &(0x7f0000000180)=[{&(0x7f0000000000)=""/121, 0x79}, {&(0x7f0000000080)=""/121, 0x79}], 0x2, 0x0, 0x0) fdatasync(r3) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x200200, 0x4) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) r4 = socket$inet6(0xa, 0x1, 0x0) fchown(r4, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, &(0x7f0000000240), 0x4) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000480)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb}, 0x15182, 0x7, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r1, 0x0, 0xfffffdef) 14:12:07 executing program 0: syz_emit_ethernet(0x56, &(0x7f0000000200)={@multicast, @local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '#\x00\b', 0x20, 0x2c, 0x0, @empty, @local, {[@routing={0x88, 0x2, 0x0, 0x0, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}]}], {0x0, 0x0, 0x8}}}}}}, 0x0) 14:12:07 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f00000001c0)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp\x00') preadv(r3, &(0x7f0000000180)=[{&(0x7f0000000000)=""/121, 0x79}, {&(0x7f0000000080)=""/121, 0x79}], 0x2, 0x0, 0x0) fdatasync(r3) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x200200, 0x4) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) r4 = socket$inet6(0xa, 0x1, 0x0) fchown(r4, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, &(0x7f0000000240), 0x4) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000480)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb}, 0x15182, 0x7, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r1, 0x0, 0xfffffdef) 14:12:07 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f00000001c0)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp\x00') preadv(r3, &(0x7f0000000180)=[{&(0x7f0000000000)=""/121, 0x79}, {&(0x7f0000000080)=""/121, 0x79}], 0x2, 0x0, 0x0) fdatasync(r3) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x200200, 0x4) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) r4 = socket$inet6(0xa, 0x1, 0x0) fchown(r4, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, &(0x7f0000000240), 0x4) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000480)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb}, 0x15182, 0x7, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r1, 0x0, 0xfffffdef) [ 131.581055] loop7: detected capacity change from 0 to 40 [ 131.582575] loop5: detected capacity change from 0 to 40 [ 131.588385] loop2: detected capacity change from 0 to 3520 [ 131.612571] ISO 9660 Extensions: Microsoft Joliet Level 3 [ 131.612909] loop6: detected capacity change from 0 to 40 [ 131.620343] ISOFS: changing to secondary root 14:12:07 executing program 4: msync(&(0x7f0000fef000/0x2000)=nil, 0x2000, 0x6) 14:12:07 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000100)=@req3={0x0, 0x5}, 0x1c) 14:12:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000600)=@newsa={0x104, 0x10, 0x1, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@empty, 0x0, 0x3c}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14, 0xe, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x104}}, 0x0) [ 131.725600] syz-executor.5: attempt to access beyond end of device [ 131.725600] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 131.726935] Buffer I/O error on dev loop5, logical block 10, lost async page write 14:12:07 executing program 2: getresuid(&(0x7f0000000000), 0x0, 0x0) [ 131.781493] syz-executor.7: attempt to access beyond end of device [ 131.781493] loop7: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 131.782989] Buffer I/O error on dev loop7, logical block 10, lost async page write 14:12:07 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000100)=@req3={0x0, 0x5}, 0x1c) 14:12:07 executing program 0: syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), 0xffffffffffffffff) 14:12:07 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0xb, 0x0, 0x0) 14:12:07 executing program 2: syz_usb_connect$uac1(0x0, 0x71, &(0x7f0000000500)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) 14:12:08 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f00000001c0)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp\x00') preadv(r3, &(0x7f0000000180)=[{&(0x7f0000000000)=""/121, 0x79}, {&(0x7f0000000080)=""/121, 0x79}], 0x2, 0x0, 0x0) fdatasync(r3) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x200200, 0x4) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) r4 = socket$inet6(0xa, 0x1, 0x0) fchown(r4, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, &(0x7f0000000240), 0x4) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000480)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb}, 0x15182, 0x7, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r1, 0x0, 0xfffffdef) 14:12:08 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f00000001c0)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp\x00') preadv(r3, &(0x7f0000000180)=[{&(0x7f0000000000)=""/121, 0x79}, {&(0x7f0000000080)=""/121, 0x79}], 0x2, 0x0, 0x0) fdatasync(r3) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x200200, 0x4) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) r4 = socket$inet6(0xa, 0x1, 0x0) fchown(r4, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, &(0x7f0000000240), 0x4) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000480)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb}, 0x15182, 0x7, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r1, 0x0, 0xfffffdef) [ 131.938010] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 131.943533] misc raw-gadget: fail, usb_gadget_register_driver returned -16 14:12:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x8, 0x4) bind$netlink(r0, &(0x7f0000000000), 0xc) [ 131.964391] loop7: detected capacity change from 0 to 40 14:12:08 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000100)=@req3={0x0, 0x5}, 0x1c) [ 132.000718] syz-executor.6: attempt to access beyond end of device [ 132.000718] loop6: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 132.002236] Buffer I/O error on dev loop6, logical block 10, lost async page write 14:12:08 executing program 4: socket$nl_route(0x10, 0x3, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x14, 0x1, 0x70bd2a, 0x25dfdbfc, {0x1a}, [@INET_DIAG_REQ_BYTECODE={0x1b, 0x1, "d9eaeed8e8e246ceeefdba945a236aa0305093e212a628"}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000005}, 0x4008001) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f00000003c0)={@initdev}, &(0x7f0000000400)=0xc) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000006200)={0x4, 0x0, "e33f5b", 0x0, 0x9}) 14:12:08 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KIOCSOUND(r0, 0x4b2f, 0x0) [ 132.056586] loop5: detected capacity change from 0 to 40 [ 132.098270] Bluetooth: hci4: HCI_REQ-0x0401 [ 132.112802] Bluetooth: hci4: HCI_REQ-0x0401 14:12:08 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f00000001c0)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp\x00') preadv(r3, &(0x7f0000000180)=[{&(0x7f0000000000)=""/121, 0x79}, {&(0x7f0000000080)=""/121, 0x79}], 0x2, 0x0, 0x0) fdatasync(r3) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x200200, 0x4) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) r4 = socket$inet6(0xa, 0x1, 0x0) fchown(r4, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, &(0x7f0000000240), 0x4) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000480)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb}, 0x15182, 0x7, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r1, 0x0, 0xfffffdef) 14:12:08 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$netlink(r0, 0x10e, 0xa, 0x0, &(0x7f0000001080)) 14:12:08 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000100)=@req3={0x0, 0x5}, 0x1c) 14:12:08 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f80000200040000300000000000000010000000000000002000000010006000000000000000000000000008000299ab846f153595a4b414c4c4552202046415433322020200e1fbe777cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a0000000000", 0xe0}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aa5252614100"/64, 0x40, 0x1e0}, {&(0x7f0000010200)="00000000727241610300000009000000000000000000000000000000000055aa", 0x20, 0x3e0}, {&(0x7f0000010300)="eb58906d6b66732e66617400020820000400008000f80000200040000300000000000000010000000000000002000000010006000000000000000000000000008000299ab846f153595a4b414c4c4552202046415433322020200e1fbe777cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a0000000000", 0xe0, 0xc00}, {&(0x7f0000010400)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0xde0}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0fffffff0fffffff0fffffff0f0700000008000000ffffff0fffffff0f00"/64, 0x40, 0x4000}, {&(0x7f0000010600)="f8ffff0fffffff0ff8ffff0fffffff0fffffff0fffffff0f0700000008000000ffffff0fffffff0f00"/64, 0x40, 0x4200}, {&(0x7f0000010700)="f8ffff0fffffff0ff8ffff0fffffff0fffffff0fffffff0f0700000008000000ffffff0fffffff0f00"/64, 0x40, 0x4400}, {&(0x7f0000010800)="f8ffff0fffffff0ff8ffff0fffffff0fffffff0fffffff0f0700000008000000ffffff0fffffff0f00"/64, 0x40, 0x4600}, {&(0x7f0000010900)="53595a4b414c4c45522020080000e880325132510000e880325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020100044e870325132510000e870325103000000000041660069006c00650031000f00100000ffffffffffffffffffff0000ffffffff46494c4531202020202020200044e870325132510000e870325105000a00000041660069006c00650032000f00140000ffffffffffffffffffff0000ffffffff46494c4532202020202020200044e870325132510000e870325106002823000041660069006c0065002e000f00d263006f006c0064000000ffff0000ffffffff46494c457e312020434f4c200044e870325132510000e8703251090064000000", 0x120, 0x4800}, {&(0x7f0000010b00)="2e20202020202020202020100044e870325132510000e87032510300000000002e2e202020202020202020100044e870325132510000e870325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020200044e870325132510000e870325104001a040000", 0x80, 0x5800}, {&(0x7f0000010c00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x6800}, {&(0x7f0000011100)='syzkallers\x00'/32, 0x20, 0x7800}, {&(0x7f0000011200)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0xb800}], 0x0, &(0x7f0000011300)) [ 132.175234] syz-executor.7: attempt to access beyond end of device [ 132.175234] loop7: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 132.176703] Buffer I/O error on dev loop7, logical block 10, lost async page write [ 132.189105] loop6: detected capacity change from 0 to 40 [ 132.203790] loop0: detected capacity change from 0 to 184 14:12:08 executing program 4: socket$nl_route(0x10, 0x3, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x14, 0x1, 0x70bd2a, 0x25dfdbfc, {0x1a}, [@INET_DIAG_REQ_BYTECODE={0x1b, 0x1, "d9eaeed8e8e246ceeefdba945a236aa0305093e212a628"}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000005}, 0x4008001) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f00000003c0)={@initdev}, &(0x7f0000000400)=0xc) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000006200)={0x4, 0x0, "e33f5b", 0x0, 0x9}) [ 132.241530] Bluetooth: hci4: HCI_REQ-0x0401 14:12:08 executing program 3: timer_create(0x9, 0x0, &(0x7f0000000080)) timer_delete(0x0) 14:12:08 executing program 1: ioprio_get$uid(0x3, 0x0) 14:12:08 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 14:12:08 executing program 4: socket$nl_route(0x10, 0x3, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x14, 0x1, 0x70bd2a, 0x25dfdbfc, {0x1a}, [@INET_DIAG_REQ_BYTECODE={0x1b, 0x1, "d9eaeed8e8e246ceeefdba945a236aa0305093e212a628"}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000005}, 0x4008001) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f00000003c0)={@initdev}, &(0x7f0000000400)=0xc) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000006200)={0x4, 0x0, "e33f5b", 0x0, 0x9}) [ 132.355292] Bluetooth: hci4: HCI_REQ-0x0401 [ 132.404345] syz-executor.6: attempt to access beyond end of device [ 132.404345] loop6: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 132.407721] Buffer I/O error on dev loop6, logical block 10, lost async page write [ 132.436174] syz-executor.5: attempt to access beyond end of device [ 132.436174] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 132.438350] Buffer I/O error on dev loop5, logical block 10, lost async page write [ 132.458439] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 132.461493] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 132.500109] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 132.581776] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 132.617001] syz-executor.0 (4076) used greatest stack depth: 23640 bytes left 14:12:08 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f00000001c0)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp\x00') preadv(r3, &(0x7f0000000180)=[{&(0x7f0000000000)=""/121, 0x79}, {&(0x7f0000000080)=""/121, 0x79}], 0x2, 0x0, 0x0) fdatasync(r3) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x200200, 0x4) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) r4 = socket$inet6(0xa, 0x1, 0x0) fchown(r4, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, &(0x7f0000000240), 0x4) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000480)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb}, 0x15182, 0x7, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r1, 0x0, 0xfffffdef) 14:12:08 executing program 6: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) madvise(&(0x7f000015a000/0x1000)=nil, 0x1000, 0x18) 14:12:08 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 14:12:08 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f00000001c0)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp\x00') preadv(r3, &(0x7f0000000180)=[{&(0x7f0000000000)=""/121, 0x79}, {&(0x7f0000000080)=""/121, 0x79}], 0x2, 0x0, 0x0) fdatasync(r3) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x200200, 0x4) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) r4 = socket$inet6(0xa, 0x1, 0x0) fchown(r4, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, &(0x7f0000000240), 0x4) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000480)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb}, 0x15182, 0x7, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r1, 0x0, 0xfffffdef) 14:12:08 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000000)=@ethtool_rxnfc={0x2e, 0x0, 0x0, {0x0, @usr_ip4_spec={@multicast1, @multicast1}, {0x0, @local}, @esp_ip4_spec={@broadcast, @empty}, {0x0, @local}}}}) 14:12:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000007f00)={0x1c, 0x21, 0x1, 0x0, 0x0, "", [@generic="306b02db13cfb35673"]}, 0x1c}], 0x1}, 0x0) 14:12:08 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 14:12:08 executing program 4: socket$nl_route(0x10, 0x3, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x14, 0x1, 0x70bd2a, 0x25dfdbfc, {0x1a}, [@INET_DIAG_REQ_BYTECODE={0x1b, 0x1, "d9eaeed8e8e246ceeefdba945a236aa0305093e212a628"}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000005}, 0x4008001) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f00000003c0)={@initdev}, &(0x7f0000000400)=0xc) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000006200)={0x4, 0x0, "e33f5b", 0x0, 0x9}) [ 132.662927] loop7: detected capacity change from 0 to 40 [ 132.669182] Bluetooth: hci4: HCI_REQ-0x0401 14:12:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000007f00)={0x1c, 0x21, 0x1, 0x0, 0x0, "", [@generic="306b02db13cfb35673"]}, 0x1c}], 0x1}, 0x0) [ 132.680917] loop5: detected capacity change from 0 to 40 14:12:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 14:12:08 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 14:12:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000007f00)={0x1c, 0x21, 0x1, 0x0, 0x0, "", [@generic="306b02db13cfb35673"]}, 0x1c}], 0x1}, 0x0) [ 132.787386] syz-executor.7: attempt to access beyond end of device [ 132.787386] loop7: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 132.788483] Buffer I/O error on dev loop7, logical block 10, lost async page write [ 132.811626] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 14:12:08 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 14:12:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000007f00)={0x1c, 0x21, 0x1, 0x0, 0x0, "", [@generic="306b02db13cfb35673"]}, 0x1c}], 0x1}, 0x0) 14:12:08 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) [ 132.869512] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 14:12:09 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) [ 132.949033] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 132.957668] syz-executor.5: attempt to access beyond end of device [ 132.957668] loop5: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 132.959038] Buffer I/O error on dev loop5, logical block 10, lost async page write [ 133.055643] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 133.065079] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 133.078129] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 133.127788] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 14:12:09 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 14:12:09 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 14:12:09 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 14:12:09 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 14:12:09 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 14:12:09 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 14:12:09 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) [ 133.274651] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 133.276770] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 14:12:09 executing program 5: syz_emit_ethernet(0x46, &(0x7f0000000100)={@multicast, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "2ddc20", 0x10, 0x3a, 0xff, @ipv4={'\x00', '\xff\xff', @multicast1}, @local, {[], @ndisc_ra={0x86, 0x2}}}}}}, 0x0) [ 133.293870] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 14:12:09 executing program 5: wait4(0x0, &(0x7f0000000000), 0x80000000, &(0x7f0000000040)) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = fork() waitid(0x3, r0, 0x0, 0x80000000, &(0x7f0000000100)) r1 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000300)=r1, 0x12) 14:12:09 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) [ 133.359518] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 14:12:09 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) [ 133.413432] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 133.420045] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 133.447325] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 133.488109] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 133.494238] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 14:12:09 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 14:12:09 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 14:12:09 executing program 5: get_robust_list(0x0, 0x0, 0x0) 14:12:09 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 14:12:09 executing program 5: get_robust_list(0x0, 0x0, 0x0) [ 133.620706] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 14:12:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)={0x5c, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x3e, 0xe, {@with_ht={{{0x0, 0x2}, {}, @device_b, @device_b, @from_mac=@broadcast}}, 0x0, @default, 0x0, @val={0x0, 0x6, @default_ibss_ssid}, @val, @void, @void, @void, @val={0x5, 0x3}, @void, @val={0x2a, 0x1}, @void, @void, @void, @void, @void}}]]}, 0x5c}}, 0x0) 14:12:09 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000006040)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0, 0x0) 14:12:09 executing program 0: socketpair(0x0, 0x0, 0x0, 0xfffffffffffffffc) 14:12:09 executing program 3: move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 133.684166] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 14:12:09 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) [ 133.741285] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 133.804831] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 14:12:09 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x200}, 0x0, 0x0, 0x0, 0x6, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f0000000a40), &(0x7f0000000a80)={'fscrypt:', @desc4}, &(0x7f0000000ac0)={0x0, "7dd2a7a5b6373bbe7de3b65676cd5ef810a1d9249c749864e6b0dc494786c009286aaf53d60d493f5882f4846f8261c422245093bfdd3abdbbb783c708c751df"}, 0x48, 0x0) keyctl$unlink(0x9, r0, 0x0) r1 = add_key$keyring(0x0, &(0x7f0000000540)={'syz', 0x3}, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001200)={0x0, 0x0}) keyctl$get_persistent(0x16, 0xffffffffffffffff, r1) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40008}, r2, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x7, 0x0, 0x80, 0x3f, 0x0, 0x100000001, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000380), 0xd}, 0x10000, 0xff, 0x3ff, 0x4, 0xbfd2, 0x2, 0x3f, 0x0, 0x6}, r2, 0x8, 0xffffffffffffffff, 0x1) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000000c0)=@keyring) request_key(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000004c0)=',\x00', 0xfffffffffffffffc) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)) add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, r3) add_key(&(0x7f0000000100)='id_resolver\x00', 0x0, &(0x7f0000000200)="dba6665a5bd1e7caad5e80ad860cd319ef6a6b58a8cda3bd0e5f83b509f99f680e0130740e976b81d83eb6b42148bd97d6d470af315e25d4", 0x38, 0xfffffffffffffffa) 14:12:09 executing program 3: keyctl$assume_authority(0x10, 0x0) r0 = add_key$user(&(0x7f0000001600), &(0x7f0000001640)={'syz', 0x2}, &(0x7f0000001680)="ba", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f00000016c0)="95", 0x1) keyctl$setperm(0x5, 0x0, 0x0) 14:12:09 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) sendfile(r1, r2, 0x0, 0xffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x81, 0x0, 0x54, @loopback, @ipv4={'\x00', '\xff\xff', @dev}, 0x40, 0x80, 0x7ff, 0x32ee}}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fbdbdf25100000004400018008000300000700001400020076657468315f746f5f7465616d000000140002007465616d5f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c00018014000200766c616e30000000000000000000000014000200767863616e3100"/44], 0x84}, 0x1, 0x0, 0x0, 0x2000c011}, 0x20000015) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x5390, &(0x7f0000002340)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0xfffffffffffffffc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file1\x00', 0x3709, 0x0, 0x0, 0x200480c, &(0x7f0000000400)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}], [{@uid_eq}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, 0x0) 14:12:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000001c00)={0x0, 0x0, &(0x7f0000001bc0)={0x0}}, 0x0) 14:12:09 executing program 5: get_robust_list(0x0, 0x0, 0x0) 14:12:09 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000006040)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0, 0x0) 14:12:09 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) [ 133.884093] Zero length message leads to an empty skb 14:12:10 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000006040)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0, 0x0) 14:12:10 executing program 5: get_robust_list(0x0, 0x0, 0x0) 14:12:10 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/timer\x00', 0x0, 0x0) 14:12:10 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x980, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000140)=[{&(0x7f0000001f40)=""/89, 0x59}, {&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, &(0x7f0000003840)=[{&(0x7f0000002640)=""/105, 0x69}, {0xfffffffffffffffe}], 0x2, 0x0) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000001cc0)=[{&(0x7f0000001b00)=""/156, 0x9c}, {&(0x7f0000001bc0)=""/24, 0x18}, {&(0x7f0000001c00)=""/146, 0x92}], 0x3, &(0x7f0000001f00)=[{&(0x7f0000001d00)=""/69, 0x45}, {&(0x7f0000001d80)=""/122, 0x7a}, {&(0x7f0000001e00)=""/223, 0xdf}], 0x3, 0x0) 14:12:10 executing program 3: syz_genetlink_get_family_id$nl802154(&(0x7f00000002c0), 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x2, &(0x7f0000001700)=[{&(0x7f0000000540)=']', 0x1}, {&(0x7f0000001640)="ba", 0x1}], 0x0, 0x0) syz_io_uring_setup(0x331, &(0x7f0000001940), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fef000/0x3000)=nil, &(0x7f00000019c0), &(0x7f0000001a00)) 14:12:10 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, VM DIAGNOSIS: 14:12:02 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=1ffff11002fbef44 RCX=0000000000000000 RDX=ffff88801f26b580 RSI=ffffffff813bc4c3 RDI=0000000000000005 RBP=ffff888017df7ad8 RSP=ffff888017df7a00 R8 =0000000000000005 R9 =0000000000000000 R10=0000000000000001 R11=0000000000000001 R12=0000000000000001 R13=0000000000000000 R14=0000000000000000 R15=0000000000000200 RIP=ffffffff813bc4c5 RFL=00000293 [--S-A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000555555736400 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f6a9df4b718 CR3=0000000019f92000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f6aa0add7c0 00007f6aa0add7c8 YMM02=0000000000000000 0000000000000000 00007f6aa0add7e0 00007f6aa0add7c0 YMM03=0000000000000000 0000000000000000 00007f6aa0add7c8 00007f6aa0add7c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000072 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b1c91 RDI=ffffffff87645ba0 RBP=ffffffff87645b60 RSP=ffff88806cf098b8 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000072 R11=0000000000000001 R12=0000000000000072 R13=ffffffff87645b60 R14=0000000000000010 R15=ffffffff822b1c80 RIP=ffffffff822b1ce9 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f6a9df6c700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f6a9df6d000 CR3=0000000019f92000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffffff YMM02=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffffff YMM03=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffffff YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffffff YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000