Warning: Permanently added '[localhost]:62919' (ECDSA) to the list of known hosts. 2022/09/12 12:58:34 fuzzer started 2022/09/12 12:58:34 dialing manager at localhost:38027 2022/09/12 12:58:34 checking machine... 2022/09/12 12:58:34 checking revisions... syzkaller login: [ 44.216330] kmemleak: Automatic memory scanning thread ended 2022/09/12 12:58:34 testing simple program... [ 44.310465] cgroup: Unknown subsys name 'net' [ 44.515195] cgroup: Unknown subsys name 'rlimit' executing program executing program executing program executing program [ 58.782041] audit: type=1400 audit(1662987529.405:6): avc: denied { execmem } for pid=285 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 executing program [ 59.923396] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 59.924973] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 59.927272] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 59.931595] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 59.933385] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 59.934803] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 59.939825] Bluetooth: hci0: HCI_REQ-0x0c1a [ 62.011705] Bluetooth: hci0: command 0x0409 tx timeout executing program [ 64.059090] Bluetooth: hci0: command 0x041b tx timeout executing program [ 66.107096] Bluetooth: hci0: command 0x040f tx timeout executing program [ 68.155116] Bluetooth: hci0: command 0x0419 tx timeout executing program executing program executing program executing program 2022/09/12 12:59:11 building call list... executing program [ 83.456991] audit: type=1400 audit(1662987554.079:7): avc: denied { create } for pid=264 comm="syz-fuzzer" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1 executing program 2022/09/12 12:59:18 syscalls: 2215 2022/09/12 12:59:18 code coverage: enabled 2022/09/12 12:59:18 comparison tracing: enabled 2022/09/12 12:59:18 extra coverage: enabled 2022/09/12 12:59:18 setuid sandbox: enabled 2022/09/12 12:59:18 namespace sandbox: enabled 2022/09/12 12:59:18 Android sandbox: enabled 2022/09/12 12:59:18 fault injection: enabled 2022/09/12 12:59:18 leak checking: enabled 2022/09/12 12:59:18 net packet injection: enabled 2022/09/12 12:59:18 net device setup: enabled 2022/09/12 12:59:18 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/12 12:59:18 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/12 12:59:18 USB emulation: enabled 2022/09/12 12:59:18 hci packet injection: enabled 2022/09/12 12:59:18 wifi device emulation: failed to parse kernel version (6.0.0-rc5-next-20220912) 2022/09/12 12:59:18 802.15.4 emulation: enabled 2022/09/12 12:59:18 fetching corpus: 0, signal 0/0 (executing program) 2022/09/12 12:59:18 fetching corpus: 0, signal 0/0 (executing program) 2022/09/12 12:59:19 starting 8 fuzzer processes 12:59:19 executing program 1: mbind(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4002, &(0x7f0000000000)=0xcd5, 0x9, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x2) 12:59:19 executing program 0: syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x0, &(0x7f0000000900)={[{@fat=@nfs}, {@fat=@usefree}]}) 12:59:19 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x4e}}) 12:59:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)={0x1c, 0x1e, 0x1, 0x0, 0x0, "", [@typed={0x7, 0x0, 0x0, 0x0, @binary="d8c931"}, @nested={0x4}]}, 0x1c}], 0x1}, 0x0) 12:59:19 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)={0x14}, 0x14}}, 0x0) 12:59:19 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) 12:59:19 executing program 7: getresgid(0xffffffffffffffff, 0x0, 0x0) 12:59:19 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) getsockopt$inet6_tcp_int(r0, 0x6, 0x2, 0x0, &(0x7f0000000280)) [ 90.320929] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 90.322996] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 90.324836] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 90.327791] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 90.338421] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 90.340827] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 90.347111] Bluetooth: hci0: HCI_REQ-0x0c1a [ 90.368389] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 90.398912] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 90.400312] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 90.402281] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 90.403277] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 90.405944] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 90.408512] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 90.409770] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 90.412640] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 90.414212] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 90.415462] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 90.416470] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 90.418380] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 90.421626] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 90.422765] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 90.423805] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 90.424746] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 90.426163] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 90.430994] Bluetooth: hci1: HCI_REQ-0x0c1a [ 90.434987] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 90.442585] Bluetooth: hci2: HCI_REQ-0x0c1a [ 90.456347] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 90.462384] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 90.466317] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 90.470210] Bluetooth: hci3: HCI_REQ-0x0c1a [ 90.478555] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 90.480571] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 90.481898] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 90.483229] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 90.485734] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 90.487329] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 90.488692] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 90.490235] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 90.495142] Bluetooth: hci7: HCI_REQ-0x0c1a [ 90.512135] Bluetooth: hci4: HCI_REQ-0x0c1a [ 92.412630] Bluetooth: hci0: command 0x0409 tx timeout [ 92.475168] Bluetooth: hci6: Opcode 0x c03 failed: -110 [ 92.476224] Bluetooth: hci2: command 0x0409 tx timeout [ 92.476575] Bluetooth: hci5: Opcode 0x c03 failed: -110 [ 92.476708] Bluetooth: hci1: command 0x0409 tx timeout [ 92.539052] Bluetooth: hci4: command 0x0409 tx timeout [ 92.539073] Bluetooth: hci7: command 0x0409 tx timeout [ 92.540152] Bluetooth: hci3: command 0x0409 tx timeout [ 94.459127] Bluetooth: hci0: command 0x041b tx timeout [ 94.523101] Bluetooth: hci1: command 0x041b tx timeout [ 94.523785] Bluetooth: hci2: command 0x041b tx timeout [ 94.587115] Bluetooth: hci3: command 0x041b tx timeout [ 94.587977] Bluetooth: hci7: command 0x041b tx timeout [ 94.589544] Bluetooth: hci4: command 0x041b tx timeout [ 95.247542] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 95.248770] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 95.250419] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 95.252293] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 95.253404] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 95.254469] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 95.260062] Bluetooth: hci6: HCI_REQ-0x0c1a [ 96.507192] Bluetooth: hci0: command 0x040f tx timeout [ 96.571121] Bluetooth: hci2: command 0x040f tx timeout [ 96.571994] Bluetooth: hci1: command 0x040f tx timeout [ 96.635106] Bluetooth: hci4: command 0x040f tx timeout [ 96.635944] Bluetooth: hci7: command 0x040f tx timeout [ 96.638694] Bluetooth: hci3: command 0x040f tx timeout [ 97.083356] Bluetooth: hci5: Opcode 0x c03 failed: -110 [ 97.275141] Bluetooth: hci6: command 0x0409 tx timeout [ 98.555068] Bluetooth: hci0: command 0x0419 tx timeout [ 98.619639] Bluetooth: hci1: command 0x0419 tx timeout [ 98.620290] Bluetooth: hci2: command 0x0419 tx timeout [ 98.683216] Bluetooth: hci3: command 0x0419 tx timeout [ 98.685674] Bluetooth: hci7: command 0x0419 tx timeout [ 98.686368] Bluetooth: hci4: command 0x0419 tx timeout [ 99.323139] Bluetooth: hci6: command 0x041b tx timeout [ 99.572245] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 99.575028] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 99.578435] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 99.583187] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 99.585701] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 99.587549] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 99.593086] Bluetooth: hci5: HCI_REQ-0x0c1a [ 101.371111] Bluetooth: hci6: command 0x040f tx timeout [ 101.627129] Bluetooth: hci5: command 0x0409 tx timeout [ 103.419153] Bluetooth: hci6: command 0x0419 tx timeout [ 103.675098] Bluetooth: hci5: command 0x041b tx timeout [ 105.723184] Bluetooth: hci5: command 0x040f tx timeout [ 107.771088] Bluetooth: hci5: command 0x0419 tx timeout [ 144.688495] audit: type=1400 audit(1662987615.312:8): avc: denied { open } for pid=4199 comm="syz-executor.4" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 144.689922] audit: type=1400 audit(1662987615.312:9): avc: denied { kernel } for pid=4199 comm="syz-executor.4" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 13:00:15 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) 13:00:15 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) 13:00:15 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) [ 145.099850] ------------[ cut here ]------------ [ 145.099890] [ 145.099895] ====================================================== [ 145.099901] WARNING: possible circular locking dependency detected [ 145.099908] 6.0.0-rc5-next-20220912 #1 Not tainted [ 145.099920] ------------------------------------------------------ [ 145.099925] syz-executor.4/4226 is trying to acquire lock: [ 145.099937] ffffffff853fa878 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 145.099996] [ 145.099996] but task is already holding lock: [ 145.100001] ffff88800f08d020 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 145.100059] [ 145.100059] which lock already depends on the new lock. [ 145.100059] [ 145.100064] [ 145.100064] the existing dependency chain (in reverse order) is: [ 145.100069] [ 145.100069] -> #3 (&ctx->lock){....}-{2:2}: [ 145.100094] _raw_spin_lock+0x2a/0x40 [ 145.100124] __perf_event_task_sched_out+0x53b/0x18d0 [ 145.100146] __schedule+0xedd/0x2470 [ 145.100164] schedule+0xda/0x1b0 [ 145.100180] exit_to_user_mode_prepare+0x114/0x1a0 [ 145.100218] syscall_exit_to_user_mode+0x19/0x40 [ 145.100249] do_syscall_64+0x48/0x90 [ 145.100273] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 145.100304] [ 145.100304] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 145.100330] _raw_spin_lock_nested+0x30/0x40 [ 145.100357] raw_spin_rq_lock_nested+0x1e/0x30 [ 145.100379] task_fork_fair+0x63/0x4d0 [ 145.100411] sched_cgroup_fork+0x3d0/0x540 [ 145.100437] copy_process+0x3f9e/0x6df0 [ 145.100455] kernel_clone+0xe7/0x890 [ 145.100472] user_mode_thread+0xad/0xf0 [ 145.100491] rest_init+0x24/0x250 [ 145.100521] arch_call_rest_init+0xf/0x14 [ 145.100554] start_kernel+0x4c1/0x4e6 [ 145.100585] secondary_startup_64_no_verify+0xe0/0xeb [ 145.100610] [ 145.100610] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 145.100636] _raw_spin_lock_irqsave+0x39/0x60 [ 145.100663] try_to_wake_up+0xab/0x1920 [ 145.100688] up+0x75/0xb0 [ 145.100709] __up_console_sem+0x6e/0x80 [ 145.100777] console_unlock+0x46a/0x590 [ 145.100817] vprintk_emit+0x1bd/0x560 [ 145.100851] vprintk+0x84/0xa0 [ 145.100881] _printk+0xba/0xf1 [ 145.100913] kauditd_hold_skb.cold+0x3f/0x4e [ 145.100939] kauditd_send_queue+0x233/0x290 [ 145.100966] kauditd_thread+0x5da/0x9a0 [ 145.100991] kthread+0x2ed/0x3a0 [ 145.101018] ret_from_fork+0x22/0x30 [ 145.101041] [ 145.101041] -> #0 ((console_sem).lock){....}-{2:2}: [ 145.101067] __lock_acquire+0x2a02/0x5e70 [ 145.101098] lock_acquire+0x1a2/0x530 [ 145.101127] _raw_spin_lock_irqsave+0x39/0x60 [ 145.101155] down_trylock+0xe/0x70 [ 145.101178] __down_trylock_console_sem+0x3b/0xd0 [ 145.101208] vprintk_emit+0x16b/0x560 [ 145.101239] vprintk+0x84/0xa0 [ 145.101270] _printk+0xba/0xf1 [ 145.101300] report_bug.cold+0x72/0xab [ 145.101322] handle_bug+0x3c/0x70 [ 145.101345] exc_invalid_op+0x14/0x50 [ 145.101370] asm_exc_invalid_op+0x16/0x20 [ 145.101399] group_sched_out.part.0+0x2c7/0x460 [ 145.101419] ctx_sched_out+0x8f1/0xc10 [ 145.101437] __perf_event_task_sched_out+0x6d0/0x18d0 [ 145.101459] __schedule+0xedd/0x2470 [ 145.101476] schedule+0xda/0x1b0 [ 145.101493] exit_to_user_mode_prepare+0x114/0x1a0 [ 145.101529] syscall_exit_to_user_mode+0x19/0x40 [ 145.101560] do_syscall_64+0x48/0x90 [ 145.101584] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 145.101615] [ 145.101615] other info that might help us debug this: [ 145.101615] [ 145.101620] Chain exists of: [ 145.101620] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 145.101620] [ 145.101647] Possible unsafe locking scenario: [ 145.101647] [ 145.101651] CPU0 CPU1 [ 145.101655] ---- ---- [ 145.101659] lock(&ctx->lock); [ 145.101669] lock(&rq->__lock); [ 145.101681] lock(&ctx->lock); [ 145.101692] lock((console_sem).lock); [ 145.101703] [ 145.101703] *** DEADLOCK *** [ 145.101703] [ 145.101706] 2 locks held by syz-executor.4/4226: [ 145.101719] #0: ffff88806ce37cd8 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 145.101766] #1: ffff88800f08d020 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 145.101817] [ 145.101817] stack backtrace: [ 145.101822] CPU: 0 PID: 4226 Comm: syz-executor.4 Not tainted 6.0.0-rc5-next-20220912 #1 [ 145.101845] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 145.101859] Call Trace: [ 145.101865] [ 145.101872] dump_stack_lvl+0x8b/0xb3 [ 145.101899] check_noncircular+0x263/0x2e0 [ 145.101930] ? format_decode+0x26c/0xb50 [ 145.101956] ? print_circular_bug+0x450/0x450 [ 145.101988] ? enable_ptr_key_workfn+0x20/0x20 [ 145.102016] ? format_decode+0x26c/0xb50 [ 145.102044] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 145.102078] __lock_acquire+0x2a02/0x5e70 [ 145.102119] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 145.102161] lock_acquire+0x1a2/0x530 [ 145.102193] ? down_trylock+0xe/0x70 [ 145.102221] ? rcu_read_unlock+0x40/0x40 [ 145.102257] ? __lock_acquire+0x164d/0x5e70 [ 145.102291] ? vprintk+0x84/0xa0 [ 145.102326] _raw_spin_lock_irqsave+0x39/0x60 [ 145.102354] ? down_trylock+0xe/0x70 [ 145.102380] down_trylock+0xe/0x70 [ 145.102405] ? vprintk+0x84/0xa0 [ 145.102437] __down_trylock_console_sem+0x3b/0xd0 [ 145.102470] vprintk_emit+0x16b/0x560 [ 145.102507] vprintk+0x84/0xa0 [ 145.102540] _printk+0xba/0xf1 [ 145.102573] ? record_print_text.cold+0x16/0x16 [ 145.102614] ? report_bug.cold+0x66/0xab [ 145.102640] ? group_sched_out.part.0+0x2c7/0x460 [ 145.102661] report_bug.cold+0x72/0xab [ 145.102688] handle_bug+0x3c/0x70 [ 145.102713] exc_invalid_op+0x14/0x50 [ 145.102740] asm_exc_invalid_op+0x16/0x20 [ 145.102772] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 145.102796] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 145.102817] RSP: 0018:ffff888039defc48 EFLAGS: 00010006 [ 145.102834] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 145.102848] RDX: ffff888039d69ac0 RSI: ffffffff81566027 RDI: 0000000000000005 [ 145.102862] RBP: ffff8880086605c8 R08: 0000000000000005 R09: 0000000000000001 [ 145.102876] R10: 0000000000000000 R11: ffffffff865aa01b R12: ffff88800f08d000 [ 145.102890] R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 145.102910] ? group_sched_out.part.0+0x2c7/0x460 [ 145.102935] ? group_sched_out.part.0+0x2c7/0x460 [ 145.102959] ctx_sched_out+0x8f1/0xc10 [ 145.102982] __perf_event_task_sched_out+0x6d0/0x18d0 [ 145.103011] ? lock_is_held_type+0xd7/0x130 [ 145.103045] ? __perf_cgroup_move+0x160/0x160 [ 145.103067] ? set_next_entity+0x304/0x550 [ 145.103100] ? update_curr+0x267/0x740 [ 145.103135] ? lock_is_held_type+0xd7/0x130 [ 145.103170] __schedule+0xedd/0x2470 [ 145.103194] ? io_schedule_timeout+0x150/0x150 [ 145.103216] ? rcu_read_lock_sched_held+0x3e/0x80 [ 145.103254] schedule+0xda/0x1b0 [ 145.103274] exit_to_user_mode_prepare+0x114/0x1a0 [ 145.103313] syscall_exit_to_user_mode+0x19/0x40 [ 145.103347] do_syscall_64+0x48/0x90 [ 145.103372] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 145.103405] RIP: 0033:0x7fc8f6a85b19 [ 145.103420] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 145.103440] RSP: 002b:00007fc8f3ffb218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 145.103460] RAX: 0000000000000001 RBX: 00007fc8f6b98f68 RCX: 00007fc8f6a85b19 [ 145.103475] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fc8f6b98f6c [ 145.103488] RBP: 00007fc8f6b98f60 R08: 000000000000000e R09: 0000000000000000 [ 145.103502] R10: 0000000000000003 R11: 0000000000000246 R12: 00007fc8f6b98f6c [ 145.103515] R13: 00007ffec2c9ef1f R14: 00007fc8f3ffb300 R15: 0000000000022000 [ 145.103539] [ 145.208950] WARNING: CPU: 0 PID: 4226 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 145.210226] Modules linked in: [ 145.210690] CPU: 0 PID: 4226 Comm: syz-executor.4 Not tainted 6.0.0-rc5-next-20220912 #1 [ 145.211846] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 145.213458] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 145.214235] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 145.216770] RSP: 0018:ffff888039defc48 EFLAGS: 00010006 [ 145.217525] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 145.218525] RDX: ffff888039d69ac0 RSI: ffffffff81566027 RDI: 0000000000000005 [ 145.219516] RBP: ffff8880086605c8 R08: 0000000000000005 R09: 0000000000000001 [ 145.220512] R10: 0000000000000000 R11: ffffffff865aa01b R12: ffff88800f08d000 [ 145.221646] R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 145.222818] FS: 00007fc8f3ffb700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 145.224139] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 145.225116] CR2: 00007fc8f6b99018 CR3: 000000002d008000 CR4: 0000000000350ef0 [ 145.226287] Call Trace: [ 145.226722] [ 145.227115] ctx_sched_out+0x8f1/0xc10 [ 145.227773] __perf_event_task_sched_out+0x6d0/0x18d0 [ 145.228640] ? lock_is_held_type+0xd7/0x130 [ 145.229403] ? __perf_cgroup_move+0x160/0x160 [ 145.230167] ? set_next_entity+0x304/0x550 [ 145.230897] ? update_curr+0x267/0x740 [ 145.231570] ? lock_is_held_type+0xd7/0x130 [ 145.232310] __schedule+0xedd/0x2470 [ 145.232955] ? io_schedule_timeout+0x150/0x150 [ 145.233727] ? rcu_read_lock_sched_held+0x3e/0x80 [ 145.234552] schedule+0xda/0x1b0 [ 145.235130] exit_to_user_mode_prepare+0x114/0x1a0 [ 145.235968] syscall_exit_to_user_mode+0x19/0x40 [ 145.236781] do_syscall_64+0x48/0x90 [ 145.237425] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 145.238255] RIP: 0033:0x7fc8f6a85b19 [ 145.238860] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 145.241696] RSP: 002b:00007fc8f3ffb218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 145.242895] RAX: 0000000000000001 RBX: 00007fc8f6b98f68 RCX: 00007fc8f6a85b19 [ 145.244029] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fc8f6b98f6c [ 145.245159] RBP: 00007fc8f6b98f60 R08: 000000000000000e R09: 0000000000000000 [ 145.246325] R10: 0000000000000003 R11: 0000000000000246 R12: 00007fc8f6b98f6c [ 145.247505] R13: 00007ffec2c9ef1f R14: 00007fc8f3ffb300 R15: 0000000000022000 [ 145.248680] [ 145.249114] irq event stamp: 368 [ 145.249665] hardirqs last enabled at (367): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 145.251214] hardirqs last disabled at (368): [] __schedule+0x1225/0x2470 [ 145.252448] softirqs last enabled at (224): [] __irq_exit_rcu+0x11b/0x180 [ 145.253637] softirqs last disabled at (109): [] __irq_exit_rcu+0x11b/0x180 [ 145.254801] ---[ end trace 0000000000000000 ]--- 13:00:15 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) 13:00:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) 13:00:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) 13:00:16 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 13:00:16 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, 0x1c) [ 146.681678] FAT-fs (loop0): bogus number of reserved sectors [ 146.682370] FAT-fs (loop0): Can't find a valid FAT filesystem 13:00:19 executing program 1: mbind(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4002, &(0x7f0000000000)=0xcd5, 0x9, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x2) 13:00:19 executing program 7: getresgid(0xffffffffffffffff, 0x0, 0x0) 13:00:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)={0x1c, 0x1e, 0x1, 0x0, 0x0, "", [@typed={0x7, 0x0, 0x0, 0x0, @binary="d8c931"}, @nested={0x4}]}, 0x1c}], 0x1}, 0x0) 13:00:19 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) getsockopt$inet6_tcp_int(r0, 0x6, 0x2, 0x0, &(0x7f0000000280)) 13:00:19 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x4e}}) 13:00:19 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)={0x14}, 0x14}}, 0x0) 13:00:19 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 13:00:19 executing program 0: syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x0, &(0x7f0000000900)={[{@fat=@nfs}, {@fat=@usefree}]}) [ 149.317956] FAT-fs (loop0): bogus number of reserved sectors [ 149.318751] FAT-fs (loop0): Can't find a valid FAT filesystem 13:00:19 executing program 1: mbind(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4002, &(0x7f0000000000)=0xcd5, 0x9, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x2) 13:00:19 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)={0x14}, 0x14}}, 0x0) 13:00:19 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 13:00:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)={0x1c, 0x1e, 0x1, 0x0, 0x0, "", [@typed={0x7, 0x0, 0x0, 0x0, @binary="d8c931"}, @nested={0x4}]}, 0x1c}], 0x1}, 0x0) 13:00:19 executing program 7: getresgid(0xffffffffffffffff, 0x0, 0x0) 13:00:19 executing program 0: syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x0, &(0x7f0000000900)={[{@fat=@nfs}, {@fat=@usefree}]}) 13:00:20 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x4e}}) 13:00:20 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) getsockopt$inet6_tcp_int(r0, 0x6, 0x2, 0x0, &(0x7f0000000280)) [ 149.407435] FAT-fs (loop0): bogus number of reserved sectors [ 149.408053] FAT-fs (loop0): Can't find a valid FAT filesystem 13:00:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)={0x14}, 0x14}}, 0x0) 13:00:20 executing program 7: getresgid(0xffffffffffffffff, 0x0, 0x0) 13:00:20 executing program 0: syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000300)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x0, &(0x7f0000000900)={[{@fat=@nfs}, {@fat=@usefree}]}) 13:00:20 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) getsockopt$inet6_tcp_int(r0, 0x6, 0x2, 0x0, &(0x7f0000000280)) 13:00:20 executing program 4: mbind(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4002, &(0x7f0000000000)=0xcd5, 0x9, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x2) [ 149.498439] FAT-fs (loop0): bogus number of reserved sectors [ 149.499231] FAT-fs (loop0): Can't find a valid FAT filesystem 13:00:20 executing program 1: mbind(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4002, &(0x7f0000000000)=0xcd5, 0x9, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x2) 13:00:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) getsockopt$inet6_tcp_int(r0, 0x6, 0x2, 0x0, &(0x7f0000000280)) 13:00:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)={0x1c, 0x1e, 0x1, 0x0, 0x0, "", [@typed={0x7, 0x0, 0x0, 0x0, @binary="d8c931"}, @nested={0x4}]}, 0x1c}], 0x1}, 0x0) 13:00:20 executing program 7: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x4e}}) 13:00:20 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x4e}}) 13:00:20 executing program 6: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)={0x14}, 0x14}}, 0x0) 13:00:20 executing program 4: mbind(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4002, &(0x7f0000000000)=0xcd5, 0x9, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x2) 13:00:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) getsockopt$inet6_tcp_int(r0, 0x6, 0x2, 0x0, &(0x7f0000000280)) 13:00:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)={0x1c, 0x1e, 0x1, 0x0, 0x0, "", [@typed={0x7, 0x0, 0x0, 0x0, @binary="d8c931"}, @nested={0x4}]}, 0x1c}], 0x1}, 0x0) 13:00:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) getsockopt$inet6_tcp_int(r0, 0x6, 0x2, 0x0, &(0x7f0000000280)) 13:00:20 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 13:00:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)={0x1c, 0x1e, 0x1, 0x0, 0x0, "", [@typed={0x7, 0x0, 0x0, 0x0, @binary="d8c931"}, @nested={0x4}]}, 0x1c}], 0x1}, 0x0) 13:00:20 executing program 7: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x4e}}) 13:00:20 executing program 6: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)={0x14}, 0x14}}, 0x0) 13:00:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) getsockopt$inet6_tcp_int(r0, 0x6, 0x2, 0x0, &(0x7f0000000280)) 13:00:20 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000340)=ANY=[]) utime(&(0x7f0000000640)='./file1\x00', 0x0) 13:00:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)={0x1c, 0x1e, 0x1, 0x0, 0x0, "", [@typed={0x7, 0x0, 0x0, 0x0, @binary="d8c931"}, @nested={0x4}]}, 0x1c}], 0x1}, 0x0) 13:00:20 executing program 4: mbind(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4002, &(0x7f0000000000)=0xcd5, 0x9, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x2) 13:00:20 executing program 7: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_channels={0x4e}}) 13:00:20 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 13:00:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) getsockopt$inet6_tcp_int(r0, 0x6, 0x2, 0x0, &(0x7f0000000280)) 13:00:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) getsockopt$inet6_tcp_int(r0, 0x6, 0x2, 0x0, &(0x7f0000000280)) 13:00:20 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000340)=ANY=[]) utime(&(0x7f0000000640)='./file1\x00', 0x0) 13:00:20 executing program 6: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)={0x14}, 0x14}}, 0x0) 13:00:20 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000340)=ANY=[]) utime(&(0x7f0000000640)='./file1\x00', 0x0) 13:00:20 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000340)=ANY=[]) utime(&(0x7f0000000640)='./file1\x00', 0x0) 13:00:20 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000340)=ANY=[]) utime(&(0x7f0000000640)='./file1\x00', 0x0) 13:00:20 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000340)=ANY=[]) utime(&(0x7f0000000640)='./file1\x00', 0x0) 13:00:20 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000340)=ANY=[]) utime(&(0x7f0000000640)='./file1\x00', 0x0) 13:00:20 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 13:00:20 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000340)=ANY=[]) utime(&(0x7f0000000640)='./file1\x00', 0x0) 13:00:20 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000340)=ANY=[]) utime(&(0x7f0000000640)='./file1\x00', 0x0) 13:00:20 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000340)=ANY=[]) utime(&(0x7f0000000640)='./file1\x00', 0x0) 13:00:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r0, 0x400, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_open_procfs(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) ioctl$CDROMRESET(r1, 0x5312) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x1340b3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0xd0009411, &(0x7f0000000500)={{0x0, 0x0, 0x8, 0x3ff000000000000, 0xfff, 0xffffffffffffff7f, 0x5, 0xb3, 0x6, 0x1000, 0x1f, 0xff, 0x5a2065f, 0x2, 0x1000}}) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) 13:00:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) fallocate(r2, 0x3, 0x0, 0x8040001) 13:00:20 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6}]}) [ 150.035206] audit: type=1326 audit(1662987620.659:10): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4635 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f4bbd17db19 code=0x0 [ 150.040596] audit: type=1326 audit(1662987620.664:11): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4636 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f427178cb19 code=0x0 [ 150.142031] hrtimer: interrupt took 27001 ns [ 150.189431] audit: type=1400 audit(1662987620.813:12): avc: denied { write } for pid=4635 comm="syz-executor.5" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 150.875811] audit: type=1326 audit(1662987621.499:13): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4635 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f4bbd17db19 code=0x0 13:00:24 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000340)=ANY=[]) utime(&(0x7f0000000640)='./file1\x00', 0x0) 13:00:24 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0xa, 0x0, &(0x7f0000000640)) 13:00:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) fallocate(r2, 0x3, 0x0, 0x8040001) 13:00:24 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xf523}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000340)) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r0) r2 = signalfd4(r1, &(0x7f0000000040)={[0x4]}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0xfff}}, './file0\x00'}) 13:00:24 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000340)=ANY=[]) utime(&(0x7f0000000640)='./file1\x00', 0x0) 13:00:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r0, 0x400, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_open_procfs(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) ioctl$CDROMRESET(r1, 0x5312) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x1340b3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0xd0009411, &(0x7f0000000500)={{0x0, 0x0, 0x8, 0x3ff000000000000, 0xfff, 0xffffffffffffff7f, 0x5, 0xb3, 0x6, 0x1000, 0x1f, 0xff, 0x5a2065f, 0x2, 0x1000}}) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) 13:00:24 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6}]}) 13:00:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r0, 0x400, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_open_procfs(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) ioctl$CDROMRESET(r1, 0x5312) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x1340b3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0xd0009411, &(0x7f0000000500)={{0x0, 0x0, 0x8, 0x3ff000000000000, 0xfff, 0xffffffffffffff7f, 0x5, 0xb3, 0x6, 0x1000, 0x1f, 0xff, 0x5a2065f, 0x2, 0x1000}}) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) [ 154.168523] audit: type=1326 audit(1662987624.792:14): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4662 comm="syz-executor.2" exe="/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f4afef30b19 code=0x0 [ 154.200358] audit: type=1326 audit(1662987624.824:15): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4666 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f427178cb19 code=0x0 13:00:24 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0, 0x820, &(0x7f0000000340)=ANY=[]) utime(&(0x7f0000000640)='./file1\x00', 0x0) 13:00:24 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0xa, 0x0, &(0x7f0000000640)) 13:00:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) fallocate(r2, 0x3, 0x0, 0x8040001) 13:00:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r0, 0x400, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_open_procfs(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) ioctl$CDROMRESET(r1, 0x5312) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file1\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x1340b3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0xd0009411, &(0x7f0000000500)={{0x0, 0x0, 0x8, 0x3ff000000000000, 0xfff, 0xffffffffffffff7f, 0x5, 0xb3, 0x6, 0x1000, 0x1f, 0xff, 0x5a2065f, 0x2, 0x1000}}) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) [ 154.300770] audit: type=1326 audit(1662987624.924:16): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4670 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f4bbd17db19 code=0x0 13:00:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)='9', 0x1, 0x8040000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4042, 0x0) fallocate(r2, 0x3, 0x0, 0x8040001) 13:00:24 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6}]}) 13:00:25 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0xa, 0x0, &(0x7f0000000640)) [ 154.394153] audit: type=1326 audit(1662987625.017:17): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4678 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fae5c56ab19 code=0x0 13:00:25 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0xa, 0x0, &(0x7f0000000640)) 13:00:25 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xf523}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000340)) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r0) r2 = signalfd4(r1, &(0x7f0000000040)={[0x4]}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0xfff}}, './file0\x00'}) [ 154.483229] audit: type=1326 audit(1662987625.106:18): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4689 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f427178cb19 code=0x0 13:00:25 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6}]}) 13:00:25 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xf523}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000340)) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r0) r2 = signalfd4(r1, &(0x7f0000000040)={[0x4]}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0xfff}}, './file0\x00'}) 13:00:25 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xf523}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000340)) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r0) r2 = signalfd4(r1, &(0x7f0000000040)={[0x4]}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0xfff}}, './file0\x00'}) 13:00:25 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xf523}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000340)) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r0) r2 = signalfd4(r1, &(0x7f0000000040)={[0x4]}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0xfff}}, './file0\x00'}) 13:00:25 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xf523}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000340)) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r0) r2 = signalfd4(r1, &(0x7f0000000040)={[0x4]}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0xfff}}, './file0\x00'}) [ 154.796569] audit: type=1326 audit(1662987625.419:19): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4703 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f427178cb19 code=0x0 VM DIAGNOSIS: 13:00:16 Registers: info registers vcpu 0 RAX=000000000000005b RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b1e41 RDI=ffffffff8763fae0 RBP=ffffffff8763faa0 RSP=ffff888039def698 R8 =0000000000000001 R9 =000000000000000a R10=000000000000005b R11=0000000000000001 R12=000000000000005b R13=ffffffff8763faa0 R14=0000000000000010 R15=ffffffff822b1e30 RIP=ffffffff822b1e99 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fc8f3ffb700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fc8f6b99018 CR3=000000002d008000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007fc8f6b6c7c0 00007fc8f6b6c7c8 YMM02=0000000000000000 0000000000000000 00007fc8f6b6c7e0 00007fc8f6b6c7c0 YMM03=0000000000000000 0000000000000000 00007fc8f6b6c7c8 00007fc8f6b6c7c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=0000559fcab8e000 RCX=ffffffff816923ed RDX=ffff888039d6b580 RSI=0000559fcab8e000 RDI=0000559fcab8e000 RBP=0000559fcab8e000 RSP=ffff888039ea7908 R8 =0000000000000006 R9 =0000559fcab8e000 R10=0000559fcab8e000 R11=0000000000000001 R12=0000559fcab8e000 R13=0000000000000004 R14=dffffc0000000000 R15=ffff888039ea7cf8 RIP=ffffffff81461394 RFL=00000296 [--S-AP-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f81c2d056f4 CR3=00000000188aa000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffffff YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 0000000000000000 00000000000000ff YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000