Warning: Permanently added '[localhost]:59925' (ECDSA) to the list of known hosts. 2022/09/13 14:34:08 fuzzer started 2022/09/13 14:34:08 dialing manager at localhost:36597 syzkaller login: [ 44.040748] cgroup: Unknown subsys name 'net' [ 44.192560] cgroup: Unknown subsys name 'rlimit' 2022/09/13 14:34:21 syscalls: 2215 2022/09/13 14:34:21 code coverage: enabled 2022/09/13 14:34:21 comparison tracing: enabled 2022/09/13 14:34:21 extra coverage: enabled 2022/09/13 14:34:21 setuid sandbox: enabled 2022/09/13 14:34:21 namespace sandbox: enabled 2022/09/13 14:34:21 Android sandbox: enabled 2022/09/13 14:34:21 fault injection: enabled 2022/09/13 14:34:21 leak checking: enabled 2022/09/13 14:34:21 net packet injection: enabled 2022/09/13 14:34:21 net device setup: enabled 2022/09/13 14:34:21 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/13 14:34:21 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/13 14:34:21 USB emulation: enabled 2022/09/13 14:34:21 hci packet injection: enabled 2022/09/13 14:34:21 wifi device emulation: failed to parse kernel version (6.0.0-rc5-next-20220913) 2022/09/13 14:34:21 802.15.4 emulation: enabled 2022/09/13 14:34:21 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/13 14:34:21 fetching corpus: 50, signal 28735/32192 (executing program) 2022/09/13 14:34:21 fetching corpus: 100, signal 41093/45917 (executing program) 2022/09/13 14:34:22 fetching corpus: 150, signal 49830/55954 (executing program) 2022/09/13 14:34:22 fetching corpus: 200, signal 58729/65946 (executing program) 2022/09/13 14:34:22 fetching corpus: 250, signal 64950/73243 (executing program) 2022/09/13 14:34:22 fetching corpus: 300, signal 72618/81791 (executing program) 2022/09/13 14:34:22 fetching corpus: 350, signal 78235/88312 (executing program) 2022/09/13 14:34:22 fetching corpus: 400, signal 83042/93996 (executing program) 2022/09/13 14:34:22 fetching corpus: 450, signal 87300/99072 (executing program) 2022/09/13 14:34:23 fetching corpus: 500, signal 93180/105510 (executing program) 2022/09/13 14:34:23 fetching corpus: 550, signal 96122/109319 (executing program) 2022/09/13 14:34:23 fetching corpus: 600, signal 100540/114241 (executing program) 2022/09/13 14:34:23 fetching corpus: 650, signal 102762/117246 (executing program) 2022/09/13 14:34:23 fetching corpus: 700, signal 105894/120978 (executing program) 2022/09/13 14:34:23 fetching corpus: 750, signal 111175/126457 (executing program) 2022/09/13 14:34:24 fetching corpus: 800, signal 114271/129965 (executing program) 2022/09/13 14:34:24 fetching corpus: 850, signal 117008/133159 (executing program) 2022/09/13 14:34:24 fetching corpus: 900, signal 119403/135996 (executing program) 2022/09/13 14:34:24 fetching corpus: 950, signal 121445/138518 (executing program) 2022/09/13 14:34:24 fetching corpus: 1000, signal 125069/142265 (executing program) 2022/09/13 14:34:24 fetching corpus: 1050, signal 128088/145453 (executing program) 2022/09/13 14:34:24 fetching corpus: 1100, signal 129467/147275 (executing program) 2022/09/13 14:34:25 fetching corpus: 1150, signal 131044/149209 (executing program) 2022/09/13 14:34:25 fetching corpus: 1200, signal 132599/151154 (executing program) 2022/09/13 14:34:25 fetching corpus: 1250, signal 134496/153278 (executing program) 2022/09/13 14:34:25 fetching corpus: 1300, signal 135661/154846 (executing program) 2022/09/13 14:34:25 fetching corpus: 1350, signal 137288/156708 (executing program) 2022/09/13 14:34:25 fetching corpus: 1400, signal 139173/158733 (executing program) 2022/09/13 14:34:25 fetching corpus: 1450, signal 140764/160572 (executing program) 2022/09/13 14:34:26 fetching corpus: 1500, signal 142351/162335 (executing program) 2022/09/13 14:34:26 fetching corpus: 1550, signal 144050/164138 (executing program) 2022/09/13 14:34:26 fetching corpus: 1600, signal 146416/166392 (executing program) 2022/09/13 14:34:26 fetching corpus: 1650, signal 148203/168278 (executing program) 2022/09/13 14:34:26 fetching corpus: 1700, signal 149649/169859 (executing program) 2022/09/13 14:34:26 fetching corpus: 1750, signal 151100/171511 (executing program) 2022/09/13 14:34:27 fetching corpus: 1800, signal 152474/173018 (executing program) 2022/09/13 14:34:27 fetching corpus: 1850, signal 154217/174698 (executing program) 2022/09/13 14:34:27 fetching corpus: 1900, signal 155824/176223 (executing program) 2022/09/13 14:34:27 fetching corpus: 1950, signal 156994/177448 (executing program) 2022/09/13 14:34:27 fetching corpus: 2000, signal 158273/178736 (executing program) 2022/09/13 14:34:27 fetching corpus: 2050, signal 160006/180274 (executing program) 2022/09/13 14:34:28 fetching corpus: 2100, signal 161185/181409 (executing program) 2022/09/13 14:34:28 fetching corpus: 2150, signal 162600/182689 (executing program) 2022/09/13 14:34:28 fetching corpus: 2200, signal 164061/183969 (executing program) 2022/09/13 14:34:28 fetching corpus: 2250, signal 165280/185066 (executing program) 2022/09/13 14:34:28 fetching corpus: 2300, signal 166670/186239 (executing program) 2022/09/13 14:34:28 fetching corpus: 2350, signal 168096/187446 (executing program) 2022/09/13 14:34:28 fetching corpus: 2400, signal 169320/188549 (executing program) 2022/09/13 14:34:29 fetching corpus: 2450, signal 171485/190023 (executing program) 2022/09/13 14:34:29 fetching corpus: 2500, signal 172537/190949 (executing program) 2022/09/13 14:34:29 fetching corpus: 2550, signal 173394/191800 (executing program) 2022/09/13 14:34:29 fetching corpus: 2600, signal 174144/192536 (executing program) 2022/09/13 14:34:29 fetching corpus: 2650, signal 175341/193461 (executing program) 2022/09/13 14:34:29 fetching corpus: 2700, signal 176213/194220 (executing program) 2022/09/13 14:34:29 fetching corpus: 2750, signal 177477/195089 (executing program) 2022/09/13 14:34:30 fetching corpus: 2800, signal 178855/196025 (executing program) 2022/09/13 14:34:30 fetching corpus: 2850, signal 179915/196781 (executing program) 2022/09/13 14:34:30 fetching corpus: 2900, signal 180668/197395 (executing program) 2022/09/13 14:34:30 fetching corpus: 2950, signal 181846/198266 (executing program) 2022/09/13 14:34:30 fetching corpus: 3000, signal 182436/198775 (executing program) 2022/09/13 14:34:30 fetching corpus: 3050, signal 183231/199353 (executing program) 2022/09/13 14:34:30 fetching corpus: 3100, signal 184315/200042 (executing program) 2022/09/13 14:34:31 fetching corpus: 3150, signal 185173/200603 (executing program) 2022/09/13 14:34:31 fetching corpus: 3200, signal 186389/201297 (executing program) 2022/09/13 14:34:31 fetching corpus: 3250, signal 188544/202300 (executing program) 2022/09/13 14:34:31 fetching corpus: 3300, signal 189568/202938 (executing program) 2022/09/13 14:34:31 fetching corpus: 3350, signal 190542/203495 (executing program) 2022/09/13 14:34:31 fetching corpus: 3400, signal 191479/203996 (executing program) 2022/09/13 14:34:31 fetching corpus: 3450, signal 192082/204352 (executing program) 2022/09/13 14:34:32 fetching corpus: 3500, signal 192923/204814 (executing program) 2022/09/13 14:34:32 fetching corpus: 3550, signal 193825/205227 (executing program) 2022/09/13 14:34:32 fetching corpus: 3600, signal 194414/205565 (executing program) 2022/09/13 14:34:32 fetching corpus: 3650, signal 195169/205946 (executing program) 2022/09/13 14:34:32 fetching corpus: 3700, signal 195834/206264 (executing program) 2022/09/13 14:34:32 fetching corpus: 3750, signal 196953/206705 (executing program) 2022/09/13 14:34:32 fetching corpus: 3800, signal 197831/207108 (executing program) 2022/09/13 14:34:33 fetching corpus: 3850, signal 198606/207389 (executing program) 2022/09/13 14:34:33 fetching corpus: 3900, signal 199737/207814 (executing program) 2022/09/13 14:34:33 fetching corpus: 3950, signal 200571/208137 (executing program) 2022/09/13 14:34:33 fetching corpus: 4000, signal 201570/208515 (executing program) 2022/09/13 14:34:33 fetching corpus: 4050, signal 202432/208785 (executing program) 2022/09/13 14:34:33 fetching corpus: 4057, signal 202467/208867 (executing program) 2022/09/13 14:34:33 fetching corpus: 4057, signal 202467/208942 (executing program) 2022/09/13 14:34:33 fetching corpus: 4057, signal 202467/209012 (executing program) 2022/09/13 14:34:33 fetching corpus: 4057, signal 202467/209078 (executing program) 2022/09/13 14:34:33 fetching corpus: 4057, signal 202467/209133 (executing program) 2022/09/13 14:34:33 fetching corpus: 4057, signal 202467/209205 (executing program) 2022/09/13 14:34:33 fetching corpus: 4057, signal 202467/209281 (executing program) 2022/09/13 14:34:33 fetching corpus: 4057, signal 202467/209357 (executing program) 2022/09/13 14:34:33 fetching corpus: 4057, signal 202467/209435 (executing program) 2022/09/13 14:34:33 fetching corpus: 4057, signal 202467/209498 (executing program) 2022/09/13 14:34:33 fetching corpus: 4057, signal 202467/209582 (executing program) 2022/09/13 14:34:33 fetching corpus: 4057, signal 202467/209654 (executing program) 2022/09/13 14:34:33 fetching corpus: 4057, signal 202467/209716 (executing program) 2022/09/13 14:34:33 fetching corpus: 4057, signal 202467/209798 (executing program) 2022/09/13 14:34:33 fetching corpus: 4057, signal 202467/209880 (executing program) 2022/09/13 14:34:33 fetching corpus: 4057, signal 202467/209946 (executing program) 2022/09/13 14:34:33 fetching corpus: 4057, signal 202467/210020 (executing program) 2022/09/13 14:34:33 fetching corpus: 4057, signal 202467/210105 (executing program) 2022/09/13 14:34:33 fetching corpus: 4057, signal 202467/210179 (executing program) 2022/09/13 14:34:33 fetching corpus: 4057, signal 202467/210260 (executing program) 2022/09/13 14:34:33 fetching corpus: 4057, signal 202467/210285 (executing program) 2022/09/13 14:34:33 fetching corpus: 4057, signal 202467/210285 (executing program) 2022/09/13 14:34:36 starting 8 fuzzer processes 14:34:36 executing program 0: r0 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 14:34:36 executing program 1: syz_io_uring_setup(0x14eb, &(0x7f0000000280), &(0x7f0000005000/0x3000)=nil, &(0x7f0000002000/0x4000)=nil, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001880)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(r1, &(0x7f0000000380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x1, 0x0, r1, 0x0, &(0x7f00000003c0)="19873f5d6f6ba6647501e1dee4b532a73f88e8a7066f97188994fc7f4310741b7b5e5a9e23a8e9d7bdfbdcb2ead360082d8e3fc4b615f8e24805a00af305034f58ee7c0b6455ee19b87cd17142fe3b53f1d749f53f02bb53d01efcbf5800f473910d9a51abac19edb64d29caba", 0x6d, 0x0, 0x1}, 0x1) vmsplice(r0, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r2, 0x0, 0x0, 0x87ffffc) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000001340)="e4eb8e5355feefc9b3c48a57cf1602a197c4b0087f7e5812368dc3bab70e0418263fc620b190aa02558bcfb0e65cb7786074964845b33e3618af6ae487cb258242e1e8731eec366954e0c20a64f07e48", 0x50}], 0x1, 0x8d, 0x7bf6) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x185002, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 14:34:36 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000000), 0xc) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x401a012, r0, 0x0) 14:34:36 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1e, &(0x7f00000000c0)={@remote}, 0x20) [ 72.027305] audit: type=1400 audit(1663079676.611:6): avc: denied { execmem } for pid=285 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 14:34:36 executing program 4: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 14:34:36 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x200842, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x208000, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="03000000000000bc2186382458468ed2b83a00666973653000"]) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 14:34:36 executing program 6: r0 = syz_io_uring_setup(0x4f02, &(0x7f00000002c0), &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x3, &(0x7f00000000c0)={0x77359400}}, 0x8) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x6c64, 0x0, 0x0, 0x0, 0x0) 14:34:36 executing program 7: timer_create(0x0, 0x0, &(0x7f0000000400)) timer_create(0x0, &(0x7f0000000540)={0x0, 0x0, 0x7a3c61813f7a04e8}, 0x0) [ 73.257556] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 73.260712] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 73.262864] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 73.266865] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 73.269295] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 73.270505] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 73.276142] Bluetooth: hci0: HCI_REQ-0x0c1a [ 73.286788] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 73.311326] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 73.313296] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 73.316379] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 73.318113] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 73.320123] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 73.321117] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 73.322268] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 73.324101] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 73.325125] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 73.326173] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 73.327610] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 73.333515] Bluetooth: hci1: HCI_REQ-0x0c1a [ 73.339903] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 73.341234] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 73.343125] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 73.343507] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 73.345581] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 73.346794] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 73.351087] Bluetooth: hci2: HCI_REQ-0x0c1a [ 73.359431] Bluetooth: hci3: HCI_REQ-0x0c1a [ 73.404601] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 73.406692] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 73.412968] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 73.416380] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 73.417827] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 73.419348] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 73.420646] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 73.429647] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 73.439553] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 73.451917] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 73.452914] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 73.456364] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 73.458186] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 73.459153] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 73.460092] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 73.461295] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 73.462548] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 73.463512] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 73.473125] Bluetooth: hci5: HCI_REQ-0x0c1a [ 73.476126] Bluetooth: hci6: HCI_REQ-0x0c1a [ 73.477172] Bluetooth: hci7: HCI_REQ-0x0c1a [ 75.336156] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 75.336572] Bluetooth: hci0: command 0x0409 tx timeout [ 75.400118] Bluetooth: hci3: command 0x0409 tx timeout [ 75.400937] Bluetooth: hci2: command 0x0409 tx timeout [ 75.401969] Bluetooth: hci1: command 0x0409 tx timeout [ 75.529050] Bluetooth: hci6: command 0x0409 tx timeout [ 75.529540] Bluetooth: hci7: command 0x0409 tx timeout [ 75.529947] Bluetooth: hci5: command 0x0409 tx timeout [ 77.384118] Bluetooth: hci0: command 0x041b tx timeout [ 77.448203] Bluetooth: hci1: command 0x041b tx timeout [ 77.449932] Bluetooth: hci2: command 0x041b tx timeout [ 77.450942] Bluetooth: hci3: command 0x041b tx timeout [ 77.576274] Bluetooth: hci5: command 0x041b tx timeout [ 77.577155] Bluetooth: hci7: command 0x041b tx timeout [ 77.577930] Bluetooth: hci6: command 0x041b tx timeout [ 78.900877] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 78.903689] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 78.905651] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 78.913294] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 78.917144] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 78.917891] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 78.922250] Bluetooth: hci4: HCI_REQ-0x0c1a [ 79.432051] Bluetooth: hci0: command 0x040f tx timeout [ 79.496074] Bluetooth: hci3: command 0x040f tx timeout [ 79.496554] Bluetooth: hci2: command 0x040f tx timeout [ 79.497725] Bluetooth: hci1: command 0x040f tx timeout [ 79.624560] Bluetooth: hci6: command 0x040f tx timeout [ 79.625219] Bluetooth: hci7: command 0x040f tx timeout [ 79.625669] Bluetooth: hci5: command 0x040f tx timeout [ 80.968061] Bluetooth: hci4: command 0x0409 tx timeout [ 81.480267] Bluetooth: hci0: command 0x0419 tx timeout [ 81.544140] Bluetooth: hci1: command 0x0419 tx timeout [ 81.545076] Bluetooth: hci2: command 0x0419 tx timeout [ 81.545844] Bluetooth: hci3: command 0x0419 tx timeout [ 81.672202] Bluetooth: hci5: command 0x0419 tx timeout [ 81.673274] Bluetooth: hci7: command 0x0419 tx timeout [ 81.673775] Bluetooth: hci6: command 0x0419 tx timeout [ 83.016101] Bluetooth: hci4: command 0x041b tx timeout [ 85.064070] Bluetooth: hci4: command 0x040f tx timeout [ 87.112112] Bluetooth: hci4: command 0x0419 tx timeout 14:35:29 executing program 4: r0 = inotify_init() close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) pwritev(r0, 0x0, 0x0, 0x0, 0x0) 14:35:29 executing program 4: r0 = inotify_init() close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) pwritev(r0, 0x0, 0x0, 0x0, 0x0) 14:35:30 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1e, &(0x7f00000000c0)={@remote}, 0x20) 14:35:30 executing program 4: r0 = inotify_init() close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) pwritev(r0, 0x0, 0x0, 0x0, 0x0) 14:35:30 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1e, &(0x7f00000000c0)={@remote}, 0x20) 14:35:30 executing program 4: r0 = inotify_init() close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) pwritev(r0, 0x0, 0x0, 0x0, 0x0) 14:35:30 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1e, &(0x7f00000000c0)={@remote}, 0x20) 14:35:30 executing program 3: mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000040)=0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x90c83, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000100)='/,*\x00', 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) openat2(r1, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) ioctl$SNAPSHOT_FREE(r4, 0x3305) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x1000, 0x7, &(0x7f0000fff000/0x1000)=nil) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f00000001c0)=0x1) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) [ 126.422513] audit: type=1400 audit(1663079731.007:7): avc: denied { open } for pid=3851 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 126.424029] audit: type=1400 audit(1663079731.007:8): avc: denied { kernel } for pid=3851 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 126.449278] ------------[ cut here ]------------ [ 126.449314] [ 126.449320] ====================================================== [ 126.449327] WARNING: possible circular locking dependency detected [ 126.449333] 6.0.0-rc5-next-20220913 #1 Not tainted [ 126.449345] ------------------------------------------------------ [ 126.449351] syz-executor.3/3852 is trying to acquire lock: [ 126.449362] ffffffff853fa878 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 126.449428] [ 126.449428] but task is already holding lock: [ 126.449433] ffff88800ec0b420 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 126.449483] [ 126.449483] which lock already depends on the new lock. [ 126.449483] [ 126.449489] [ 126.449489] the existing dependency chain (in reverse order) is: [ 126.449495] [ 126.449495] -> #3 (&ctx->lock){....}-{2:2}: [ 126.449520] _raw_spin_lock+0x2a/0x40 [ 126.449551] __perf_event_task_sched_out+0x53b/0x18d0 [ 126.449574] __schedule+0xedd/0x2470 [ 126.449604] schedule+0xda/0x1b0 [ 126.449621] futex_wait_queue+0xf5/0x1e0 [ 126.449646] futex_wait+0x28e/0x690 [ 126.449664] do_futex+0x2ff/0x380 [ 126.449681] __x64_sys_futex+0x1c6/0x4d0 [ 126.449699] do_syscall_64+0x3b/0x90 [ 126.449724] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 126.449757] [ 126.449757] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 126.449782] _raw_spin_lock_nested+0x30/0x40 [ 126.449809] raw_spin_rq_lock_nested+0x1e/0x30 [ 126.449833] task_fork_fair+0x63/0x4d0 [ 126.449864] sched_cgroup_fork+0x3d0/0x540 [ 126.449890] copy_process+0x3f9e/0x6df0 [ 126.449909] kernel_clone+0xe7/0x890 [ 126.449927] user_mode_thread+0xad/0xf0 [ 126.449946] rest_init+0x24/0x250 [ 126.449977] arch_call_rest_init+0xf/0x14 [ 126.450012] start_kernel+0x4c1/0x4e6 [ 126.450044] secondary_startup_64_no_verify+0xe0/0xeb [ 126.450069] [ 126.450069] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 126.450094] _raw_spin_lock_irqsave+0x39/0x60 [ 126.450122] try_to_wake_up+0xab/0x1920 [ 126.450147] up+0x75/0xb0 [ 126.450168] __up_console_sem+0x6e/0x80 [ 126.450198] console_unlock+0x46a/0x590 [ 126.450227] vprintk_emit+0x1bd/0x560 [ 126.450259] vprintk+0x84/0xa0 [ 126.450289] _printk+0xba/0xf1 [ 126.450321] kauditd_hold_skb.cold+0x3f/0x4e [ 126.450347] kauditd_send_queue+0x233/0x290 [ 126.450374] kauditd_thread+0x5da/0x9a0 [ 126.450400] kthread+0x2ed/0x3a0 [ 126.450427] ret_from_fork+0x22/0x30 [ 126.450450] [ 126.450450] -> #0 ((console_sem).lock){....}-{2:2}: [ 126.450475] __lock_acquire+0x2a02/0x5e70 [ 126.450506] lock_acquire+0x1a2/0x530 [ 126.450536] _raw_spin_lock_irqsave+0x39/0x60 [ 126.450563] down_trylock+0xe/0x70 [ 126.450586] __down_trylock_console_sem+0x3b/0xd0 [ 126.450617] vprintk_emit+0x16b/0x560 [ 126.450647] vprintk+0x84/0xa0 [ 126.450678] _printk+0xba/0xf1 [ 126.450708] report_bug.cold+0x72/0xab [ 126.450731] handle_bug+0x3c/0x70 [ 126.450754] exc_invalid_op+0x14/0x50 [ 126.450779] asm_exc_invalid_op+0x16/0x20 [ 126.450809] group_sched_out.part.0+0x2c7/0x460 [ 126.450829] ctx_sched_out+0x8f1/0xc10 [ 126.450846] __perf_event_task_sched_out+0x6d0/0x18d0 [ 126.450869] __schedule+0xedd/0x2470 [ 126.450887] schedule+0xda/0x1b0 [ 126.450904] futex_wait_queue+0xf5/0x1e0 [ 126.450923] futex_wait+0x28e/0x690 [ 126.450941] do_futex+0x2ff/0x380 [ 126.450957] __x64_sys_futex+0x1c6/0x4d0 [ 126.450975] do_syscall_64+0x3b/0x90 [ 126.450999] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 126.451030] [ 126.451030] other info that might help us debug this: [ 126.451030] [ 126.451035] Chain exists of: [ 126.451035] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 126.451035] [ 126.451063] Possible unsafe locking scenario: [ 126.451063] [ 126.451067] CPU0 CPU1 [ 126.451071] ---- ---- [ 126.451075] lock(&ctx->lock); [ 126.451086] lock(&rq->__lock); [ 126.451098] lock(&ctx->lock); [ 126.451109] lock((console_sem).lock); [ 126.451120] [ 126.451120] *** DEADLOCK *** [ 126.451120] [ 126.451123] 2 locks held by syz-executor.3/3852: [ 126.451136] #0: ffff88806ce37cd8 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 126.451183] #1: ffff88800ec0b420 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 126.451234] [ 126.451234] stack backtrace: [ 126.451239] CPU: 0 PID: 3852 Comm: syz-executor.3 Not tainted 6.0.0-rc5-next-20220913 #1 [ 126.451262] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 126.451276] Call Trace: [ 126.451282] [ 126.451289] dump_stack_lvl+0x8b/0xb3 [ 126.451316] check_noncircular+0x263/0x2e0 [ 126.451347] ? format_decode+0x26c/0xb50 [ 126.451375] ? print_circular_bug+0x450/0x450 [ 126.451407] ? enable_ptr_key_workfn+0x20/0x20 [ 126.451435] ? format_decode+0x26c/0xb50 [ 126.451463] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 126.451497] __lock_acquire+0x2a02/0x5e70 [ 126.451537] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 126.451580] lock_acquire+0x1a2/0x530 [ 126.451611] ? down_trylock+0xe/0x70 [ 126.451638] ? rcu_read_unlock+0x40/0x40 [ 126.451677] ? vprintk+0x84/0xa0 [ 126.451711] _raw_spin_lock_irqsave+0x39/0x60 [ 126.451741] ? down_trylock+0xe/0x70 [ 126.451766] down_trylock+0xe/0x70 [ 126.451790] ? vprintk+0x84/0xa0 [ 126.451823] __down_trylock_console_sem+0x3b/0xd0 [ 126.451855] vprintk_emit+0x16b/0x560 [ 126.451891] vprintk+0x84/0xa0 [ 126.451924] _printk+0xba/0xf1 [ 126.451957] ? record_print_text.cold+0x16/0x16 [ 126.451998] ? report_bug.cold+0x66/0xab [ 126.452025] ? group_sched_out.part.0+0x2c7/0x460 [ 126.452046] report_bug.cold+0x72/0xab [ 126.452073] handle_bug+0x3c/0x70 [ 126.452099] exc_invalid_op+0x14/0x50 [ 126.452126] asm_exc_invalid_op+0x16/0x20 [ 126.452158] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 126.452182] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 126.452203] RSP: 0018:ffff888018a8f8f8 EFLAGS: 00010006 [ 126.452220] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 126.452234] RDX: ffff88801024b580 RSI: ffffffff81566027 RDI: 0000000000000005 [ 126.452248] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 126.452262] R10: 0000000000000000 R11: ffffffff865aa01b R12: ffff88800ec0b400 [ 126.452276] R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 126.452296] ? group_sched_out.part.0+0x2c7/0x460 [ 126.452321] ? group_sched_out.part.0+0x2c7/0x460 [ 126.452344] ctx_sched_out+0x8f1/0xc10 [ 126.452368] __perf_event_task_sched_out+0x6d0/0x18d0 [ 126.452396] ? lock_is_held_type+0xd7/0x130 [ 126.452431] ? __perf_cgroup_move+0x160/0x160 [ 126.452453] ? set_next_entity+0x304/0x550 [ 126.452490] ? lock_is_held_type+0xd7/0x130 [ 126.452525] __schedule+0xedd/0x2470 [ 126.452549] ? io_schedule_timeout+0x150/0x150 [ 126.452570] ? futex_wait_setup+0x166/0x230 [ 126.452597] schedule+0xda/0x1b0 [ 126.452617] futex_wait_queue+0xf5/0x1e0 [ 126.452639] futex_wait+0x28e/0x690 [ 126.452662] ? futex_wait_setup+0x230/0x230 [ 126.452686] ? wake_up_q+0x8b/0xf0 [ 126.452711] ? do_raw_spin_unlock+0x4f/0x220 [ 126.452748] ? futex_wake+0x158/0x490 [ 126.452777] ? fd_install+0x1f9/0x640 [ 126.452808] do_futex+0x2ff/0x380 [ 126.452828] ? __ia32_compat_sys_get_robust_list+0x3b0/0x3b0 [ 126.452857] __x64_sys_futex+0x1c6/0x4d0 [ 126.452880] ? __x64_sys_futex_time32+0x480/0x480 [ 126.452903] ? syscall_enter_from_user_mode+0x1d/0x50 [ 126.452938] ? syscall_enter_from_user_mode+0x1d/0x50 [ 126.452976] do_syscall_64+0x3b/0x90 [ 126.453002] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 126.453035] RIP: 0033:0x7fb22e611b19 [ 126.453051] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 126.453071] RSP: 002b:00007fb22bb87218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 126.453091] RAX: ffffffffffffffda RBX: 00007fb22e724f68 RCX: 00007fb22e611b19 [ 126.453106] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fb22e724f68 [ 126.453119] RBP: 00007fb22e724f60 R08: 0000000000000000 R09: 0000000000000000 [ 126.453132] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb22e724f6c [ 126.453146] R13: 00007fff0228f15f R14: 00007fb22bb87300 R15: 0000000000022000 [ 126.453170] [ 126.500956] audit: type=1400 audit(1663079731.085:9): avc: denied { write } for pid=3851 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 126.501028] WARNING: CPU: 0 PID: 3852 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 126.573719] Modules linked in: [ 126.574170] CPU: 0 PID: 3852 Comm: syz-executor.3 Not tainted 6.0.0-rc5-next-20220913 #1 [ 126.575258] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 126.576767] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 126.577514] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 126.579932] RSP: 0018:ffff888018a8f8f8 EFLAGS: 00010006 [ 126.580654] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 126.581611] RDX: ffff88801024b580 RSI: ffffffff81566027 RDI: 0000000000000005 [ 126.582568] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 126.583524] R10: 0000000000000000 R11: ffffffff865aa01b R12: ffff88800ec0b400 [ 126.584476] R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 126.585431] FS: 00007fb22bb87700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 126.586527] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 126.587311] CR2: 00007fbc0e7041f0 CR3: 0000000015e3c000 CR4: 0000000000350ef0 [ 126.588273] Call Trace: [ 126.588641] [ 126.588961] ctx_sched_out+0x8f1/0xc10 [ 126.589503] __perf_event_task_sched_out+0x6d0/0x18d0 [ 126.590226] ? lock_is_held_type+0xd7/0x130 [ 126.590841] ? __perf_cgroup_move+0x160/0x160 [ 126.591463] ? set_next_entity+0x304/0x550 [ 126.592062] ? lock_is_held_type+0xd7/0x130 [ 126.592681] __schedule+0xedd/0x2470 [ 126.593203] ? io_schedule_timeout+0x150/0x150 [ 126.593837] ? futex_wait_setup+0x166/0x230 [ 126.594437] schedule+0xda/0x1b0 [ 126.594916] futex_wait_queue+0xf5/0x1e0 [ 126.595486] futex_wait+0x28e/0x690 [ 126.595997] ? futex_wait_setup+0x230/0x230 [ 126.596593] ? wake_up_q+0x8b/0xf0 [ 126.597090] ? do_raw_spin_unlock+0x4f/0x220 [ 126.597740] ? futex_wake+0x158/0x490 [ 126.598273] ? fd_install+0x1f9/0x640 [ 126.598806] do_futex+0x2ff/0x380 [ 126.599297] ? __ia32_compat_sys_get_robust_list+0x3b0/0x3b0 [ 126.600097] __x64_sys_futex+0x1c6/0x4d0 [ 126.600652] ? __x64_sys_futex_time32+0x480/0x480 [ 126.601312] ? syscall_enter_from_user_mode+0x1d/0x50 [ 126.602043] ? syscall_enter_from_user_mode+0x1d/0x50 [ 126.602765] do_syscall_64+0x3b/0x90 [ 126.603286] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 126.604015] RIP: 0033:0x7fb22e611b19 [ 126.604539] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 126.606985] RSP: 002b:00007fb22bb87218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 126.608017] RAX: ffffffffffffffda RBX: 00007fb22e724f68 RCX: 00007fb22e611b19 [ 126.608976] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fb22e724f68 [ 126.609951] RBP: 00007fb22e724f60 R08: 0000000000000000 R09: 0000000000000000 [ 126.610906] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb22e724f6c [ 126.611874] R13: 00007fff0228f15f R14: 00007fb22bb87300 R15: 0000000000022000 [ 126.612860] [ 126.613189] irq event stamp: 1398 [ 126.613664] hardirqs last enabled at (1397): [] syscall_enter_from_user_mode+0x1d/0x50 [ 126.614963] hardirqs last disabled at (1398): [] __schedule+0x1225/0x2470 [ 126.616092] softirqs last enabled at (1260): [] __irq_exit_rcu+0x11b/0x180 [ 126.617271] softirqs last disabled at (1255): [] __irq_exit_rcu+0x11b/0x180 [ 126.618447] ---[ end trace 0000000000000000 ]--- [ 126.624880] random: crng reseeded on system resumption [ 126.634884] Restarting kernel threads ... done. [ 126.739810] random: crng reseeded on system resumption [ 126.741449] Restarting kernel threads ... done. 14:35:33 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x200842, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x208000, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="03000000000000bc2186382458468ed2b83a00666973653000"]) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 14:35:33 executing program 7: timer_create(0x0, 0x0, &(0x7f0000000400)) timer_create(0x0, &(0x7f0000000540)={0x0, 0x0, 0x7a3c61813f7a04e8}, 0x0) 14:35:33 executing program 3: mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000040)=0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x90c83, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000100)='/,*\x00', 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) openat2(r1, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) ioctl$SNAPSHOT_FREE(r4, 0x3305) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x1000, 0x7, &(0x7f0000fff000/0x1000)=nil) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f00000001c0)=0x1) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) 14:35:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x822c2, 0x0) pwritev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)='%', 0x1}], 0x1, 0x10000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180)=0x7ff, 0xffff) 14:35:33 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000000), 0xc) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x401a012, r0, 0x0) 14:35:33 executing program 6: r0 = syz_io_uring_setup(0x4f02, &(0x7f00000002c0), &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x3, &(0x7f00000000c0)={0x77359400}}, 0x8) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x6c64, 0x0, 0x0, 0x0, 0x0) 14:35:33 executing program 1: syz_io_uring_setup(0x14eb, &(0x7f0000000280), &(0x7f0000005000/0x3000)=nil, &(0x7f0000002000/0x4000)=nil, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001880)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(r1, &(0x7f0000000380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x1, 0x0, r1, 0x0, &(0x7f00000003c0)="19873f5d6f6ba6647501e1dee4b532a73f88e8a7066f97188994fc7f4310741b7b5e5a9e23a8e9d7bdfbdcb2ead360082d8e3fc4b615f8e24805a00af305034f58ee7c0b6455ee19b87cd17142fe3b53f1d749f53f02bb53d01efcbf5800f473910d9a51abac19edb64d29caba", 0x6d, 0x0, 0x1}, 0x1) vmsplice(r0, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r2, 0x0, 0x0, 0x87ffffc) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000001340)="e4eb8e5355feefc9b3c48a57cf1602a197c4b0087f7e5812368dc3bab70e0418263fc620b190aa02558bcfb0e65cb7786074964845b33e3618af6ae487cb258242e1e8731eec366954e0c20a64f07e48", 0x50}], 0x1, 0x8d, 0x7bf6) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x185002, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 14:35:33 executing program 0: r0 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 14:35:33 executing program 6: r0 = syz_io_uring_setup(0x4f02, &(0x7f00000002c0), &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x3, &(0x7f00000000c0)={0x77359400}}, 0x8) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x6c64, 0x0, 0x0, 0x0, 0x0) 14:35:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x822c2, 0x0) pwritev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)='%', 0x1}], 0x1, 0x10000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180)=0x7ff, 0xffff) 14:35:33 executing program 7: timer_create(0x0, 0x0, &(0x7f0000000400)) timer_create(0x0, &(0x7f0000000540)={0x0, 0x0, 0x7a3c61813f7a04e8}, 0x0) 14:35:33 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000000), 0xc) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x401a012, r0, 0x0) 14:35:33 executing program 0: r0 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) [ 129.428049] random: crng reseeded on system resumption [ 129.429887] Restarting kernel threads ... done. 14:35:34 executing program 1: syz_io_uring_setup(0x14eb, &(0x7f0000000280), &(0x7f0000005000/0x3000)=nil, &(0x7f0000002000/0x4000)=nil, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001880)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(r1, &(0x7f0000000380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x1, 0x0, r1, 0x0, &(0x7f00000003c0)="19873f5d6f6ba6647501e1dee4b532a73f88e8a7066f97188994fc7f4310741b7b5e5a9e23a8e9d7bdfbdcb2ead360082d8e3fc4b615f8e24805a00af305034f58ee7c0b6455ee19b87cd17142fe3b53f1d749f53f02bb53d01efcbf5800f473910d9a51abac19edb64d29caba", 0x6d, 0x0, 0x1}, 0x1) vmsplice(r0, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r2, 0x0, 0x0, 0x87ffffc) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000001340)="e4eb8e5355feefc9b3c48a57cf1602a197c4b0087f7e5812368dc3bab70e0418263fc620b190aa02558bcfb0e65cb7786074964845b33e3618af6ae487cb258242e1e8731eec366954e0c20a64f07e48", 0x50}], 0x1, 0x8d, 0x7bf6) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x185002, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 14:35:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x822c2, 0x0) pwritev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)='%', 0x1}], 0x1, 0x10000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180)=0x7ff, 0xffff) 14:35:34 executing program 6: r0 = syz_io_uring_setup(0x4f02, &(0x7f00000002c0), &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x3, &(0x7f00000000c0)={0x77359400}}, 0x8) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x6c64, 0x0, 0x0, 0x0, 0x0) 14:35:34 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x200842, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x208000, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="03000000000000bc2186382458468ed2b83a00666973653000"]) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 14:35:34 executing program 0: r0 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 14:35:34 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000000), 0xc) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x401a012, r0, 0x0) 14:35:34 executing program 7: timer_create(0x0, 0x0, &(0x7f0000000400)) timer_create(0x0, &(0x7f0000000540)={0x0, 0x0, 0x7a3c61813f7a04e8}, 0x0) 14:35:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x822c2, 0x0) pwritev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)='%', 0x1}], 0x1, 0x10000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180)=0x7ff, 0xffff) 14:35:34 executing program 3: mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000040)=0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x90c83, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000100)='/,*\x00', 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) openat2(r1, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) ioctl$SNAPSHOT_FREE(r4, 0x3305) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x1000, 0x7, &(0x7f0000fff000/0x1000)=nil) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f00000001c0)=0x1) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) 14:35:34 executing program 6: syz_io_uring_setup(0x14eb, &(0x7f0000000280), &(0x7f0000005000/0x3000)=nil, &(0x7f0000002000/0x4000)=nil, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001880)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(r1, &(0x7f0000000380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x1, 0x0, r1, 0x0, &(0x7f00000003c0)="19873f5d6f6ba6647501e1dee4b532a73f88e8a7066f97188994fc7f4310741b7b5e5a9e23a8e9d7bdfbdcb2ead360082d8e3fc4b615f8e24805a00af305034f58ee7c0b6455ee19b87cd17142fe3b53f1d749f53f02bb53d01efcbf5800f473910d9a51abac19edb64d29caba", 0x6d, 0x0, 0x1}, 0x1) vmsplice(r0, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r2, 0x0, 0x0, 0x87ffffc) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000001340)="e4eb8e5355feefc9b3c48a57cf1602a197c4b0087f7e5812368dc3bab70e0418263fc620b190aa02558bcfb0e65cb7786074964845b33e3618af6ae487cb258242e1e8731eec366954e0c20a64f07e48", 0x50}], 0x1, 0x8d, 0x7bf6) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x185002, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 14:35:34 executing program 1: syz_io_uring_setup(0x14eb, &(0x7f0000000280), &(0x7f0000005000/0x3000)=nil, &(0x7f0000002000/0x4000)=nil, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001880)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(r1, &(0x7f0000000380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x1, 0x0, r1, 0x0, &(0x7f00000003c0)="19873f5d6f6ba6647501e1dee4b532a73f88e8a7066f97188994fc7f4310741b7b5e5a9e23a8e9d7bdfbdcb2ead360082d8e3fc4b615f8e24805a00af305034f58ee7c0b6455ee19b87cd17142fe3b53f1d749f53f02bb53d01efcbf5800f473910d9a51abac19edb64d29caba", 0x6d, 0x0, 0x1}, 0x1) vmsplice(r0, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r2, 0x0, 0x0, 0x87ffffc) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000001340)="e4eb8e5355feefc9b3c48a57cf1602a197c4b0087f7e5812368dc3bab70e0418263fc620b190aa02558bcfb0e65cb7786074964845b33e3618af6ae487cb258242e1e8731eec366954e0c20a64f07e48", 0x50}], 0x1, 0x8d, 0x7bf6) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x185002, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) [ 129.690823] random: crng reseeded on system resumption [ 129.702644] Restarting kernel threads ... done. 14:35:34 executing program 6: syz_io_uring_setup(0x14eb, &(0x7f0000000280), &(0x7f0000005000/0x3000)=nil, &(0x7f0000002000/0x4000)=nil, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001880)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(r1, &(0x7f0000000380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x1, 0x0, r1, 0x0, &(0x7f00000003c0)="19873f5d6f6ba6647501e1dee4b532a73f88e8a7066f97188994fc7f4310741b7b5e5a9e23a8e9d7bdfbdcb2ead360082d8e3fc4b615f8e24805a00af305034f58ee7c0b6455ee19b87cd17142fe3b53f1d749f53f02bb53d01efcbf5800f473910d9a51abac19edb64d29caba", 0x6d, 0x0, 0x1}, 0x1) vmsplice(r0, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r2, 0x0, 0x0, 0x87ffffc) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000001340)="e4eb8e5355feefc9b3c48a57cf1602a197c4b0087f7e5812368dc3bab70e0418263fc620b190aa02558bcfb0e65cb7786074964845b33e3618af6ae487cb258242e1e8731eec366954e0c20a64f07e48", 0x50}], 0x1, 0x8d, 0x7bf6) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x185002, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 14:35:34 executing program 3: mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000040)=0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x90c83, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000100)='/,*\x00', 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) openat2(r1, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) ioctl$SNAPSHOT_FREE(r4, 0x3305) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x1000, 0x7, &(0x7f0000fff000/0x1000)=nil) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f00000001c0)=0x1) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) 14:35:34 executing program 0: r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x12, 0xffffffffffffffff, 0x10000000) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_triestat\x00') r2 = open(&(0x7f0000000180)='./file0\x00', 0x33002, 0x18) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x100, 0x1ea) pread64(r1, &(0x7f0000000040)=""/170, 0xaa, 0x180000000000000) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x0, r1}}, 0x0) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000100)={0x12, 0xc8, &(0x7f0000000000)="b924038994273a4d28c9d89fb4cf756d162c76f458b3fbbb492916cc985eecec800860385ee70c9589e314c81376e0b5148af7a71ae4185feb82fe196cde111dffd376f401db602a667d26503c0aae67f6e7bd36b507baf6612cb006edb9b4eac5606e97b2d97dba1850ffdd2076163552d50eeb1dfd596bb2a7d1d4afdfa72db756c421ad9ddf1dc3ae3f0fcdcd783295eb9a6b50238b8a94890c1146200f010cb23e1a1e98de074d5a5299dc3aa539a2eb4fc248da2d0483dfcda36f5a0be62496425d79993bac"}) r3 = shmget$private(0x0, 0x14000, 0x0, &(0x7f0000fe7000/0x14000)=nil) shmat(r3, &(0x7f0000ff0000/0x3000)=nil, 0x4000) mlock2(&(0x7f0000ff5000/0x1000)=nil, 0x1000, 0x1) r4 = shmget$private(0x0, 0x4000, 0x4, &(0x7f0000ffc000/0x4000)=nil) shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ff8000/0x3000)=nil) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000140)={0x7ff, 0x2, 0x10001, 0x3, 0x10000, 0x80}) shmat(r4, &(0x7f0000ffb000/0x4000)=nil, 0x0) r5 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmat(r5, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) shmctl$IPC_RMID(r5, 0x0) mlock2(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) 14:35:34 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 14:35:34 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x25, &(0x7f0000000040)=0x1, 0x4) 14:35:34 executing program 2: setfsgid(0x0) [ 129.808040] hrtimer: interrupt took 32260 ns [ 129.813602] TCP: TCP_TX_DELAY enabled [ 129.873369] random: crng reseeded on system resumption [ 129.879453] Restarting kernel threads ... done. 14:35:34 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x200842, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x208000, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="03000000000000bc2186382458468ed2b83a00666973653000"]) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 14:35:34 executing program 0: r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x12, 0xffffffffffffffff, 0x10000000) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_triestat\x00') r2 = open(&(0x7f0000000180)='./file0\x00', 0x33002, 0x18) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x100, 0x1ea) pread64(r1, &(0x7f0000000040)=""/170, 0xaa, 0x180000000000000) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x0, r1}}, 0x0) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000100)={0x12, 0xc8, &(0x7f0000000000)="b924038994273a4d28c9d89fb4cf756d162c76f458b3fbbb492916cc985eecec800860385ee70c9589e314c81376e0b5148af7a71ae4185feb82fe196cde111dffd376f401db602a667d26503c0aae67f6e7bd36b507baf6612cb006edb9b4eac5606e97b2d97dba1850ffdd2076163552d50eeb1dfd596bb2a7d1d4afdfa72db756c421ad9ddf1dc3ae3f0fcdcd783295eb9a6b50238b8a94890c1146200f010cb23e1a1e98de074d5a5299dc3aa539a2eb4fc248da2d0483dfcda36f5a0be62496425d79993bac"}) r3 = shmget$private(0x0, 0x14000, 0x0, &(0x7f0000fe7000/0x14000)=nil) shmat(r3, &(0x7f0000ff0000/0x3000)=nil, 0x4000) mlock2(&(0x7f0000ff5000/0x1000)=nil, 0x1000, 0x1) r4 = shmget$private(0x0, 0x4000, 0x4, &(0x7f0000ffc000/0x4000)=nil) shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ff8000/0x3000)=nil) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000140)={0x7ff, 0x2, 0x10001, 0x3, 0x10000, 0x80}) shmat(r4, &(0x7f0000ffb000/0x4000)=nil, 0x0) r5 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmat(r5, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) shmctl$IPC_RMID(r5, 0x0) mlock2(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) 14:35:34 executing program 2: setfsgid(0x0) 14:35:34 executing program 1: r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x12, 0xffffffffffffffff, 0x10000000) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_triestat\x00') r2 = open(&(0x7f0000000180)='./file0\x00', 0x33002, 0x18) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x100, 0x1ea) pread64(r1, &(0x7f0000000040)=""/170, 0xaa, 0x180000000000000) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x0, r1}}, 0x0) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000100)={0x12, 0xc8, &(0x7f0000000000)="b924038994273a4d28c9d89fb4cf756d162c76f458b3fbbb492916cc985eecec800860385ee70c9589e314c81376e0b5148af7a71ae4185feb82fe196cde111dffd376f401db602a667d26503c0aae67f6e7bd36b507baf6612cb006edb9b4eac5606e97b2d97dba1850ffdd2076163552d50eeb1dfd596bb2a7d1d4afdfa72db756c421ad9ddf1dc3ae3f0fcdcd783295eb9a6b50238b8a94890c1146200f010cb23e1a1e98de074d5a5299dc3aa539a2eb4fc248da2d0483dfcda36f5a0be62496425d79993bac"}) r3 = shmget$private(0x0, 0x14000, 0x0, &(0x7f0000fe7000/0x14000)=nil) shmat(r3, &(0x7f0000ff0000/0x3000)=nil, 0x4000) mlock2(&(0x7f0000ff5000/0x1000)=nil, 0x1000, 0x1) r4 = shmget$private(0x0, 0x4000, 0x4, &(0x7f0000ffc000/0x4000)=nil) shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ff8000/0x3000)=nil) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000140)={0x7ff, 0x2, 0x10001, 0x3, 0x10000, 0x80}) shmat(r4, &(0x7f0000ffb000/0x4000)=nil, 0x0) r5 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmat(r5, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) shmctl$IPC_RMID(r5, 0x0) mlock2(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) 14:35:34 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x25, &(0x7f0000000040)=0x1, 0x4) 14:35:34 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 14:35:34 executing program 6: syz_io_uring_setup(0x14eb, &(0x7f0000000280), &(0x7f0000005000/0x3000)=nil, &(0x7f0000002000/0x4000)=nil, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001880)=ANY=[@ANYBLOB="140000001a000102"], 0x28}}, 0x0) recvmmsg(r1, &(0x7f0000000380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x1, 0x0, r1, 0x0, &(0x7f00000003c0)="19873f5d6f6ba6647501e1dee4b532a73f88e8a7066f97188994fc7f4310741b7b5e5a9e23a8e9d7bdfbdcb2ead360082d8e3fc4b615f8e24805a00af305034f58ee7c0b6455ee19b87cd17142fe3b53f1d749f53f02bb53d01efcbf5800f473910d9a51abac19edb64d29caba", 0x6d, 0x0, 0x1}, 0x1) vmsplice(r0, &(0x7f0000000100)=[{&(0x7f0000000140)="84", 0x20000141}], 0x1, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r2, 0x0, 0x0, 0x87ffffc) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000001340)="e4eb8e5355feefc9b3c48a57cf1602a197c4b0087f7e5812368dc3bab70e0418263fc620b190aa02558bcfb0e65cb7786074964845b33e3618af6ae487cb258242e1e8731eec366954e0c20a64f07e48", 0x50}], 0x1, 0x8d, 0x7bf6) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x185002, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 14:35:34 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 14:35:34 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 14:35:34 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x25, &(0x7f0000000040)=0x1, 0x4) 14:35:34 executing program 2: setfsgid(0x0) 14:35:34 executing program 0: r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x12, 0xffffffffffffffff, 0x10000000) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_triestat\x00') r2 = open(&(0x7f0000000180)='./file0\x00', 0x33002, 0x18) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x100, 0x1ea) pread64(r1, &(0x7f0000000040)=""/170, 0xaa, 0x180000000000000) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x0, r1}}, 0x0) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000100)={0x12, 0xc8, &(0x7f0000000000)="b924038994273a4d28c9d89fb4cf756d162c76f458b3fbbb492916cc985eecec800860385ee70c9589e314c81376e0b5148af7a71ae4185feb82fe196cde111dffd376f401db602a667d26503c0aae67f6e7bd36b507baf6612cb006edb9b4eac5606e97b2d97dba1850ffdd2076163552d50eeb1dfd596bb2a7d1d4afdfa72db756c421ad9ddf1dc3ae3f0fcdcd783295eb9a6b50238b8a94890c1146200f010cb23e1a1e98de074d5a5299dc3aa539a2eb4fc248da2d0483dfcda36f5a0be62496425d79993bac"}) r3 = shmget$private(0x0, 0x14000, 0x0, &(0x7f0000fe7000/0x14000)=nil) shmat(r3, &(0x7f0000ff0000/0x3000)=nil, 0x4000) mlock2(&(0x7f0000ff5000/0x1000)=nil, 0x1000, 0x1) r4 = shmget$private(0x0, 0x4000, 0x4, &(0x7f0000ffc000/0x4000)=nil) shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ff8000/0x3000)=nil) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000140)={0x7ff, 0x2, 0x10001, 0x3, 0x10000, 0x80}) shmat(r4, &(0x7f0000ffb000/0x4000)=nil, 0x0) r5 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmat(r5, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) shmctl$IPC_RMID(r5, 0x0) mlock2(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) 14:35:34 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 14:35:34 executing program 1: r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x12, 0xffffffffffffffff, 0x10000000) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_triestat\x00') r2 = open(&(0x7f0000000180)='./file0\x00', 0x33002, 0x18) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x100, 0x1ea) pread64(r1, &(0x7f0000000040)=""/170, 0xaa, 0x180000000000000) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x0, r1}}, 0x0) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000100)={0x12, 0xc8, &(0x7f0000000000)="b924038994273a4d28c9d89fb4cf756d162c76f458b3fbbb492916cc985eecec800860385ee70c9589e314c81376e0b5148af7a71ae4185feb82fe196cde111dffd376f401db602a667d26503c0aae67f6e7bd36b507baf6612cb006edb9b4eac5606e97b2d97dba1850ffdd2076163552d50eeb1dfd596bb2a7d1d4afdfa72db756c421ad9ddf1dc3ae3f0fcdcd783295eb9a6b50238b8a94890c1146200f010cb23e1a1e98de074d5a5299dc3aa539a2eb4fc248da2d0483dfcda36f5a0be62496425d79993bac"}) r3 = shmget$private(0x0, 0x14000, 0x0, &(0x7f0000fe7000/0x14000)=nil) shmat(r3, &(0x7f0000ff0000/0x3000)=nil, 0x4000) mlock2(&(0x7f0000ff5000/0x1000)=nil, 0x1000, 0x1) r4 = shmget$private(0x0, 0x4000, 0x4, &(0x7f0000ffc000/0x4000)=nil) shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ff8000/0x3000)=nil) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000140)={0x7ff, 0x2, 0x10001, 0x3, 0x10000, 0x80}) shmat(r4, &(0x7f0000ffb000/0x4000)=nil, 0x0) r5 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmat(r5, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) shmctl$IPC_RMID(r5, 0x0) mlock2(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) 14:35:34 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x25, &(0x7f0000000040)=0x1, 0x4) 14:35:34 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 14:35:34 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 14:35:35 executing program 2: setfsgid(0x0) 14:35:35 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 14:35:35 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 14:35:35 executing program 1: r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x12, 0xffffffffffffffff, 0x10000000) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_triestat\x00') r2 = open(&(0x7f0000000180)='./file0\x00', 0x33002, 0x18) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x100, 0x1ea) pread64(r1, &(0x7f0000000040)=""/170, 0xaa, 0x180000000000000) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x0, r1}}, 0x0) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000100)={0x12, 0xc8, &(0x7f0000000000)="b924038994273a4d28c9d89fb4cf756d162c76f458b3fbbb492916cc985eecec800860385ee70c9589e314c81376e0b5148af7a71ae4185feb82fe196cde111dffd376f401db602a667d26503c0aae67f6e7bd36b507baf6612cb006edb9b4eac5606e97b2d97dba1850ffdd2076163552d50eeb1dfd596bb2a7d1d4afdfa72db756c421ad9ddf1dc3ae3f0fcdcd783295eb9a6b50238b8a94890c1146200f010cb23e1a1e98de074d5a5299dc3aa539a2eb4fc248da2d0483dfcda36f5a0be62496425d79993bac"}) r3 = shmget$private(0x0, 0x14000, 0x0, &(0x7f0000fe7000/0x14000)=nil) shmat(r3, &(0x7f0000ff0000/0x3000)=nil, 0x4000) mlock2(&(0x7f0000ff5000/0x1000)=nil, 0x1000, 0x1) r4 = shmget$private(0x0, 0x4000, 0x4, &(0x7f0000ffc000/0x4000)=nil) shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ff8000/0x3000)=nil) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000140)={0x7ff, 0x2, 0x10001, 0x3, 0x10000, 0x80}) shmat(r4, &(0x7f0000ffb000/0x4000)=nil, 0x0) r5 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmat(r5, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) shmctl$IPC_RMID(r5, 0x0) mlock2(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) 14:35:35 executing program 0: r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x12, 0xffffffffffffffff, 0x10000000) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_triestat\x00') r2 = open(&(0x7f0000000180)='./file0\x00', 0x33002, 0x18) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x100, 0x1ea) pread64(r1, &(0x7f0000000040)=""/170, 0xaa, 0x180000000000000) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x0, r1}}, 0x0) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000100)={0x12, 0xc8, &(0x7f0000000000)="b924038994273a4d28c9d89fb4cf756d162c76f458b3fbbb492916cc985eecec800860385ee70c9589e314c81376e0b5148af7a71ae4185feb82fe196cde111dffd376f401db602a667d26503c0aae67f6e7bd36b507baf6612cb006edb9b4eac5606e97b2d97dba1850ffdd2076163552d50eeb1dfd596bb2a7d1d4afdfa72db756c421ad9ddf1dc3ae3f0fcdcd783295eb9a6b50238b8a94890c1146200f010cb23e1a1e98de074d5a5299dc3aa539a2eb4fc248da2d0483dfcda36f5a0be62496425d79993bac"}) r3 = shmget$private(0x0, 0x14000, 0x0, &(0x7f0000fe7000/0x14000)=nil) shmat(r3, &(0x7f0000ff0000/0x3000)=nil, 0x4000) mlock2(&(0x7f0000ff5000/0x1000)=nil, 0x1000, 0x1) r4 = shmget$private(0x0, 0x4000, 0x4, &(0x7f0000ffc000/0x4000)=nil) shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ff8000/0x3000)=nil) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000140)={0x7ff, 0x2, 0x10001, 0x3, 0x10000, 0x80}) shmat(r4, &(0x7f0000ffb000/0x4000)=nil, 0x0) r5 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmat(r5, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) shmctl$IPC_RMID(r5, 0x0) mlock2(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) 14:35:35 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 14:35:35 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 14:35:35 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 14:35:35 executing program 5: r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x12, 0xffffffffffffffff, 0x10000000) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_triestat\x00') r2 = open(&(0x7f0000000180)='./file0\x00', 0x33002, 0x18) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x100, 0x1ea) pread64(r1, &(0x7f0000000040)=""/170, 0xaa, 0x180000000000000) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x0, r1}}, 0x0) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000100)={0x12, 0xc8, &(0x7f0000000000)="b924038994273a4d28c9d89fb4cf756d162c76f458b3fbbb492916cc985eecec800860385ee70c9589e314c81376e0b5148af7a71ae4185feb82fe196cde111dffd376f401db602a667d26503c0aae67f6e7bd36b507baf6612cb006edb9b4eac5606e97b2d97dba1850ffdd2076163552d50eeb1dfd596bb2a7d1d4afdfa72db756c421ad9ddf1dc3ae3f0fcdcd783295eb9a6b50238b8a94890c1146200f010cb23e1a1e98de074d5a5299dc3aa539a2eb4fc248da2d0483dfcda36f5a0be62496425d79993bac"}) r3 = shmget$private(0x0, 0x14000, 0x0, &(0x7f0000fe7000/0x14000)=nil) shmat(r3, &(0x7f0000ff0000/0x3000)=nil, 0x4000) mlock2(&(0x7f0000ff5000/0x1000)=nil, 0x1000, 0x1) r4 = shmget$private(0x0, 0x4000, 0x4, &(0x7f0000ffc000/0x4000)=nil) shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ff8000/0x3000)=nil) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000140)={0x7ff, 0x2, 0x10001, 0x3, 0x10000, 0x80}) shmat(r4, &(0x7f0000ffb000/0x4000)=nil, 0x0) r5 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmat(r5, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) shmctl$IPC_RMID(r5, 0x0) mlock2(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) 14:35:35 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 14:35:35 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 14:35:35 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 14:35:35 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 14:35:35 executing program 1: r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x12, 0xffffffffffffffff, 0x10000000) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_triestat\x00') r2 = open(&(0x7f0000000180)='./file0\x00', 0x33002, 0x18) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x100, 0x1ea) pread64(r1, &(0x7f0000000040)=""/170, 0xaa, 0x180000000000000) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x0, r1}}, 0x0) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000100)={0x12, 0xc8, &(0x7f0000000000)="b924038994273a4d28c9d89fb4cf756d162c76f458b3fbbb492916cc985eecec800860385ee70c9589e314c81376e0b5148af7a71ae4185feb82fe196cde111dffd376f401db602a667d26503c0aae67f6e7bd36b507baf6612cb006edb9b4eac5606e97b2d97dba1850ffdd2076163552d50eeb1dfd596bb2a7d1d4afdfa72db756c421ad9ddf1dc3ae3f0fcdcd783295eb9a6b50238b8a94890c1146200f010cb23e1a1e98de074d5a5299dc3aa539a2eb4fc248da2d0483dfcda36f5a0be62496425d79993bac"}) r3 = shmget$private(0x0, 0x14000, 0x0, &(0x7f0000fe7000/0x14000)=nil) shmat(r3, &(0x7f0000ff0000/0x3000)=nil, 0x4000) mlock2(&(0x7f0000ff5000/0x1000)=nil, 0x1000, 0x1) r4 = shmget$private(0x0, 0x4000, 0x4, &(0x7f0000ffc000/0x4000)=nil) shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ff8000/0x3000)=nil) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000140)={0x7ff, 0x2, 0x10001, 0x3, 0x10000, 0x80}) shmat(r4, &(0x7f0000ffb000/0x4000)=nil, 0x0) r5 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmat(r5, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) shmctl$IPC_RMID(r5, 0x0) mlock2(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) 14:35:35 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 14:35:35 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chroot(0x0) 14:35:35 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chroot(0x0) 14:35:35 executing program 1: r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x12, 0xffffffffffffffff, 0x10000000) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_triestat\x00') r2 = open(&(0x7f0000000180)='./file0\x00', 0x33002, 0x18) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x100, 0x1ea) pread64(r1, &(0x7f0000000040)=""/170, 0xaa, 0x180000000000000) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x0, r1}}, 0x0) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000100)={0x12, 0xc8, &(0x7f0000000000)="b924038994273a4d28c9d89fb4cf756d162c76f458b3fbbb492916cc985eecec800860385ee70c9589e314c81376e0b5148af7a71ae4185feb82fe196cde111dffd376f401db602a667d26503c0aae67f6e7bd36b507baf6612cb006edb9b4eac5606e97b2d97dba1850ffdd2076163552d50eeb1dfd596bb2a7d1d4afdfa72db756c421ad9ddf1dc3ae3f0fcdcd783295eb9a6b50238b8a94890c1146200f010cb23e1a1e98de074d5a5299dc3aa539a2eb4fc248da2d0483dfcda36f5a0be62496425d79993bac"}) r3 = shmget$private(0x0, 0x14000, 0x0, &(0x7f0000fe7000/0x14000)=nil) shmat(r3, &(0x7f0000ff0000/0x3000)=nil, 0x4000) mlock2(&(0x7f0000ff5000/0x1000)=nil, 0x1000, 0x1) r4 = shmget$private(0x0, 0x4000, 0x4, &(0x7f0000ffc000/0x4000)=nil) shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ff8000/0x3000)=nil) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000140)={0x7ff, 0x2, 0x10001, 0x3, 0x10000, 0x80}) shmat(r4, &(0x7f0000ffb000/0x4000)=nil, 0x0) r5 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmat(r5, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) shmctl$IPC_RMID(r5, 0x0) mlock2(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) 14:35:35 executing program 5: r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x12, 0xffffffffffffffff, 0x10000000) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_triestat\x00') r2 = open(&(0x7f0000000180)='./file0\x00', 0x33002, 0x18) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x100, 0x1ea) pread64(r1, &(0x7f0000000040)=""/170, 0xaa, 0x180000000000000) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x0, r1}}, 0x0) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000100)={0x12, 0xc8, &(0x7f0000000000)="b924038994273a4d28c9d89fb4cf756d162c76f458b3fbbb492916cc985eecec800860385ee70c9589e314c81376e0b5148af7a71ae4185feb82fe196cde111dffd376f401db602a667d26503c0aae67f6e7bd36b507baf6612cb006edb9b4eac5606e97b2d97dba1850ffdd2076163552d50eeb1dfd596bb2a7d1d4afdfa72db756c421ad9ddf1dc3ae3f0fcdcd783295eb9a6b50238b8a94890c1146200f010cb23e1a1e98de074d5a5299dc3aa539a2eb4fc248da2d0483dfcda36f5a0be62496425d79993bac"}) r3 = shmget$private(0x0, 0x14000, 0x0, &(0x7f0000fe7000/0x14000)=nil) shmat(r3, &(0x7f0000ff0000/0x3000)=nil, 0x4000) mlock2(&(0x7f0000ff5000/0x1000)=nil, 0x1000, 0x1) r4 = shmget$private(0x0, 0x4000, 0x4, &(0x7f0000ffc000/0x4000)=nil) shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ff8000/0x3000)=nil) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000140)={0x7ff, 0x2, 0x10001, 0x3, 0x10000, 0x80}) shmat(r4, &(0x7f0000ffb000/0x4000)=nil, 0x0) r5 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmat(r5, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) shmctl$IPC_RMID(r5, 0x0) mlock2(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) 14:35:35 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chroot(0x0) 14:35:36 executing program 1: r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x12, 0xffffffffffffffff, 0x10000000) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_triestat\x00') r2 = open(&(0x7f0000000180)='./file0\x00', 0x33002, 0x18) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x100, 0x1ea) pread64(r1, &(0x7f0000000040)=""/170, 0xaa, 0x180000000000000) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x0, r1}}, 0x0) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000100)={0x12, 0xc8, &(0x7f0000000000)="b924038994273a4d28c9d89fb4cf756d162c76f458b3fbbb492916cc985eecec800860385ee70c9589e314c81376e0b5148af7a71ae4185feb82fe196cde111dffd376f401db602a667d26503c0aae67f6e7bd36b507baf6612cb006edb9b4eac5606e97b2d97dba1850ffdd2076163552d50eeb1dfd596bb2a7d1d4afdfa72db756c421ad9ddf1dc3ae3f0fcdcd783295eb9a6b50238b8a94890c1146200f010cb23e1a1e98de074d5a5299dc3aa539a2eb4fc248da2d0483dfcda36f5a0be62496425d79993bac"}) r3 = shmget$private(0x0, 0x14000, 0x0, &(0x7f0000fe7000/0x14000)=nil) shmat(r3, &(0x7f0000ff0000/0x3000)=nil, 0x4000) mlock2(&(0x7f0000ff5000/0x1000)=nil, 0x1000, 0x1) r4 = shmget$private(0x0, 0x4000, 0x4, &(0x7f0000ffc000/0x4000)=nil) shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ff8000/0x3000)=nil) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000140)={0x7ff, 0x2, 0x10001, 0x3, 0x10000, 0x80}) shmat(r4, &(0x7f0000ffb000/0x4000)=nil, 0x0) r5 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmat(r5, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) shmctl$IPC_RMID(r5, 0x0) mlock2(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) 14:35:36 executing program 5: r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x12, 0xffffffffffffffff, 0x10000000) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_triestat\x00') r2 = open(&(0x7f0000000180)='./file0\x00', 0x33002, 0x18) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x100, 0x1ea) pread64(r1, &(0x7f0000000040)=""/170, 0xaa, 0x180000000000000) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x0, r1}}, 0x0) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000100)={0x12, 0xc8, &(0x7f0000000000)="b924038994273a4d28c9d89fb4cf756d162c76f458b3fbbb492916cc985eecec800860385ee70c9589e314c81376e0b5148af7a71ae4185feb82fe196cde111dffd376f401db602a667d26503c0aae67f6e7bd36b507baf6612cb006edb9b4eac5606e97b2d97dba1850ffdd2076163552d50eeb1dfd596bb2a7d1d4afdfa72db756c421ad9ddf1dc3ae3f0fcdcd783295eb9a6b50238b8a94890c1146200f010cb23e1a1e98de074d5a5299dc3aa539a2eb4fc248da2d0483dfcda36f5a0be62496425d79993bac"}) r3 = shmget$private(0x0, 0x14000, 0x0, &(0x7f0000fe7000/0x14000)=nil) shmat(r3, &(0x7f0000ff0000/0x3000)=nil, 0x4000) mlock2(&(0x7f0000ff5000/0x1000)=nil, 0x1000, 0x1) r4 = shmget$private(0x0, 0x4000, 0x4, &(0x7f0000ffc000/0x4000)=nil) shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ff8000/0x3000)=nil) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000140)={0x7ff, 0x2, 0x10001, 0x3, 0x10000, 0x80}) shmat(r4, &(0x7f0000ffb000/0x4000)=nil, 0x0) r5 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmat(r5, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) shmctl$IPC_RMID(r5, 0x0) mlock2(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) 14:35:36 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chroot(0x0) 14:35:36 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 14:35:36 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 14:35:36 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 14:35:36 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, VM DIAGNOSIS: 14:35:31 Registers: info registers vcpu 0 RAX=000000000000006f RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b25c1 RDI=ffffffff8763fae0 RBP=ffffffff8763faa0 RSP=ffff888018a8f348 R8 =0000000000000001 R9 =000000000000000a R10=000000000000006f R11=0000000000000001 R12=000000000000006f R13=ffffffff8763faa0 R14=0000000000000010 R15=ffffffff822b25b0 RIP=ffffffff822b2619 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fb22bb87700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fbc0e7041f0 CR3=0000000015e3c000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007fb22e6f87c0 00007fb22e6f87c8 YMM02=0000000000000000 0000000000000000 00007fb22e6f87e0 00007fb22e6f87c0 YMM03=0000000000000000 0000000000000000 00007fb22e6f87c8 00007fb22e6f87c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=ffffffff8111b37c RCX=1ffffffff0e0ace0 RDX=0000000000000000 RSI=ffffffff840cbc3f RDI=ffffffff8111b37c RBP=ffff88802064f678 RSP=ffff88802064f588 R8 =ffffffff85ed9502 R9 =ffffffff85ed9506 R10=ffffed10040c9ed1 R11=ffff88802064f660 R12=ffff88802064f6e8 R13=0000000000000000 R14=ffff88802064f620 R15=ffff88800d46a000 RIP=ffffffff81205248 RFL=00000287 [--S--PC] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000561603e4d868 CR3=00000000180f4000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 756e696c2d34365f 3638782f62696c2f YMM01=0000000000000000 0000000000000000 6461657268747062 696c2f756e672d78 YMM02=0000000000000000 0000000000000000 00302e6f732e6461 657268747062696c YMM03=0000000000000000 0000000000000000 2f756e672d78756e 696c2d34365f3638 YMM04=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000