Debian GNU/Linux 11 syzkaller ttyS0 Warning: Permanently added '[localhost]:19042' (ECDSA) to the list of known hosts. 2022/09/16 11:49:20 fuzzer started 2022/09/16 11:49:20 dialing manager at localhost:36051 syzkaller login: [ 38.559106] cgroup: Unknown subsys name 'net' [ 38.660184] cgroup: Unknown subsys name 'rlimit' [ 48.426299] systemd-udevd (131) used greatest stack depth: 24088 bytes left 2022/09/16 11:49:36 syscalls: 2215 2022/09/16 11:49:36 code coverage: enabled 2022/09/16 11:49:36 comparison tracing: enabled 2022/09/16 11:49:36 extra coverage: enabled 2022/09/16 11:49:36 setuid sandbox: enabled 2022/09/16 11:49:36 namespace sandbox: enabled 2022/09/16 11:49:36 Android sandbox: enabled 2022/09/16 11:49:36 fault injection: enabled 2022/09/16 11:49:36 leak checking: enabled 2022/09/16 11:49:36 net packet injection: enabled 2022/09/16 11:49:36 net device setup: enabled 2022/09/16 11:49:36 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/16 11:49:36 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/16 11:49:36 USB emulation: enabled 2022/09/16 11:49:36 hci packet injection: enabled 2022/09/16 11:49:36 wifi device emulation: failed to parse kernel version (6.0.0-rc5-next-20220916) 2022/09/16 11:49:36 802.15.4 emulation: enabled 2022/09/16 11:49:36 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/16 11:49:36 fetching corpus: 36, signal 15031/18712 (executing program) 2022/09/16 11:49:36 fetching corpus: 84, signal 29203/34212 (executing program) 2022/09/16 11:49:36 fetching corpus: 134, signal 41071/47150 (executing program) 2022/09/16 11:49:36 fetching corpus: 184, signal 51582/58561 (executing program) 2022/09/16 11:49:36 fetching corpus: 234, signal 60292/68126 (executing program) 2022/09/16 11:49:37 fetching corpus: 284, signal 67777/76347 (executing program) 2022/09/16 11:49:37 fetching corpus: 334, signal 72515/81881 (executing program) 2022/09/16 11:49:37 fetching corpus: 384, signal 76032/86218 (executing program) 2022/09/16 11:49:37 fetching corpus: 434, signal 79621/90572 (executing program) 2022/09/16 11:49:37 fetching corpus: 484, signal 82396/94057 (executing program) 2022/09/16 11:49:37 fetching corpus: 534, signal 85193/97548 (executing program) 2022/09/16 11:49:37 fetching corpus: 584, signal 88351/101308 (executing program) 2022/09/16 11:49:38 fetching corpus: 634, signal 93411/106550 (executing program) 2022/09/16 11:49:38 fetching corpus: 684, signal 96681/110187 (executing program) 2022/09/16 11:49:38 fetching corpus: 734, signal 97931/112111 (executing program) 2022/09/16 11:49:38 fetching corpus: 784, signal 101899/116275 (executing program) 2022/09/16 11:49:38 fetching corpus: 834, signal 104061/118870 (executing program) 2022/09/16 11:49:38 fetching corpus: 884, signal 106781/121844 (executing program) 2022/09/16 11:49:38 fetching corpus: 934, signal 109167/124484 (executing program) 2022/09/16 11:49:39 fetching corpus: 984, signal 112505/127786 (executing program) 2022/09/16 11:49:39 fetching corpus: 1034, signal 115087/130465 (executing program) 2022/09/16 11:49:39 fetching corpus: 1084, signal 117496/132889 (executing program) 2022/09/16 11:49:39 fetching corpus: 1134, signal 119343/134872 (executing program) 2022/09/16 11:49:39 fetching corpus: 1184, signal 121572/137085 (executing program) 2022/09/16 11:49:39 fetching corpus: 1234, signal 123190/138873 (executing program) 2022/09/16 11:49:39 fetching corpus: 1284, signal 126026/141535 (executing program) 2022/09/16 11:49:40 fetching corpus: 1334, signal 128285/143663 (executing program) 2022/09/16 11:49:40 fetching corpus: 1384, signal 129379/144927 (executing program) 2022/09/16 11:49:40 fetching corpus: 1434, signal 132773/147701 (executing program) 2022/09/16 11:49:40 fetching corpus: 1484, signal 135690/150515 (executing program) 2022/09/16 11:49:40 fetching corpus: 1534, signal 137995/152486 (executing program) 2022/09/16 11:49:41 fetching corpus: 1584, signal 139778/154023 (executing program) 2022/09/16 11:49:41 fetching corpus: 1634, signal 140599/154971 (executing program) 2022/09/16 11:49:41 fetching corpus: 1684, signal 142529/156534 (executing program) 2022/09/16 11:49:41 fetching corpus: 1734, signal 144176/157923 (executing program) 2022/09/16 11:49:41 fetching corpus: 1784, signal 145419/159032 (executing program) 2022/09/16 11:49:41 fetching corpus: 1834, signal 146982/160312 (executing program) 2022/09/16 11:49:41 fetching corpus: 1884, signal 148245/161409 (executing program) 2022/09/16 11:49:42 fetching corpus: 1934, signal 150327/162829 (executing program) 2022/09/16 11:49:42 fetching corpus: 1984, signal 151873/163967 (executing program) 2022/09/16 11:49:42 fetching corpus: 2034, signal 152753/164720 (executing program) 2022/09/16 11:49:42 fetching corpus: 2084, signal 154301/165822 (executing program) 2022/09/16 11:49:42 fetching corpus: 2134, signal 155848/166854 (executing program) 2022/09/16 11:49:42 fetching corpus: 2184, signal 157160/167790 (executing program) 2022/09/16 11:49:42 fetching corpus: 2234, signal 158030/168389 (executing program) 2022/09/16 11:49:43 fetching corpus: 2284, signal 159100/169189 (executing program) 2022/09/16 11:49:43 fetching corpus: 2334, signal 160263/169935 (executing program) 2022/09/16 11:49:43 fetching corpus: 2384, signal 161206/170540 (executing program) 2022/09/16 11:49:43 fetching corpus: 2434, signal 162443/171323 (executing program) 2022/09/16 11:49:43 fetching corpus: 2484, signal 163615/172119 (executing program) 2022/09/16 11:49:43 fetching corpus: 2534, signal 164427/172645 (executing program) 2022/09/16 11:49:43 fetching corpus: 2584, signal 165406/173223 (executing program) 2022/09/16 11:49:44 fetching corpus: 2634, signal 166462/173793 (executing program) 2022/09/16 11:49:44 fetching corpus: 2684, signal 167629/174361 (executing program) 2022/09/16 11:49:44 fetching corpus: 2734, signal 168768/174895 (executing program) 2022/09/16 11:49:44 fetching corpus: 2784, signal 169655/175354 (executing program) 2022/09/16 11:49:44 fetching corpus: 2834, signal 170835/175813 (executing program) 2022/09/16 11:49:44 fetching corpus: 2884, signal 171619/176173 (executing program) 2022/09/16 11:49:44 fetching corpus: 2926, signal 172576/176554 (executing program) 2022/09/16 11:49:44 fetching corpus: 2926, signal 172576/176610 (executing program) 2022/09/16 11:49:44 fetching corpus: 2926, signal 172576/176686 (executing program) 2022/09/16 11:49:44 fetching corpus: 2926, signal 172576/176754 (executing program) 2022/09/16 11:49:45 fetching corpus: 2926, signal 172576/176811 (executing program) 2022/09/16 11:49:45 fetching corpus: 2926, signal 172576/176887 (executing program) 2022/09/16 11:49:45 fetching corpus: 2926, signal 172576/176966 (executing program) 2022/09/16 11:49:45 fetching corpus: 2926, signal 172576/177019 (executing program) 2022/09/16 11:49:45 fetching corpus: 2926, signal 172576/177075 (executing program) 2022/09/16 11:49:45 fetching corpus: 2926, signal 172576/177145 (executing program) 2022/09/16 11:49:45 fetching corpus: 2926, signal 172576/177207 (executing program) 2022/09/16 11:49:45 fetching corpus: 2926, signal 172576/177263 (executing program) 2022/09/16 11:49:45 fetching corpus: 2926, signal 172576/177327 (executing program) 2022/09/16 11:49:45 fetching corpus: 2926, signal 172576/177400 (executing program) 2022/09/16 11:49:45 fetching corpus: 2926, signal 172576/177464 (executing program) 2022/09/16 11:49:45 fetching corpus: 2926, signal 172576/177536 (executing program) 2022/09/16 11:49:45 fetching corpus: 2926, signal 172576/177606 (executing program) 2022/09/16 11:49:45 fetching corpus: 2926, signal 172576/177663 (executing program) 2022/09/16 11:49:45 fetching corpus: 2926, signal 172576/177731 (executing program) 2022/09/16 11:49:45 fetching corpus: 2926, signal 172576/177790 (executing program) 2022/09/16 11:49:45 fetching corpus: 2926, signal 172576/177864 (executing program) 2022/09/16 11:49:45 fetching corpus: 2926, signal 172576/177933 (executing program) 2022/09/16 11:49:45 fetching corpus: 2926, signal 172576/178005 (executing program) 2022/09/16 11:49:45 fetching corpus: 2926, signal 172576/178077 (executing program) 2022/09/16 11:49:45 fetching corpus: 2926, signal 172576/178147 (executing program) 2022/09/16 11:49:45 fetching corpus: 2926, signal 172576/178225 (executing program) 2022/09/16 11:49:45 fetching corpus: 2926, signal 172576/178292 (executing program) 2022/09/16 11:49:45 fetching corpus: 2926, signal 172576/178326 (executing program) 2022/09/16 11:49:45 fetching corpus: 2926, signal 172576/178326 (executing program) 2022/09/16 11:49:47 starting 8 fuzzer processes 11:49:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x0, 0x30) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1804f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 11:49:47 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000100)=[{0x20, 0x0, 0x0, 0x8}, {0x6}]}) 11:49:47 executing program 3: syz_emit_ethernet(0x26, &(0x7f0000000000)={@remote, @link_local, @void, {@arp={0x4305, @generic={0x30f, 0x0, 0x6, 0x0, 0x0, @link_local, "", @remote, "4815e7a6"}}}}, 0x0) 11:49:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8921, &(0x7f0000000000)={'lo\x00'}) 11:49:47 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x14, 0x2, 0x2, 0x101}, 0x14}}, 0x0) 11:49:47 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x4b, &(0x7f0000000040)={0x0, 0x2, 0x0, 0x0, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02']}, 0x18) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) 11:49:47 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000000c0)=0x3, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000140)={@multicast, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x1c, 0x0, @opaque="e3704100000000da07dbd83db8f73dc34f1079e4"}}}}}, 0x0) [ 64.221542] audit: type=1400 audit(1663328987.563:6): avc: denied { execmem } for pid=284 comm="syz-executor.7" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 11:49:47 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x22, &(0x7f0000000500)={[{}]}) [ 65.365288] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 65.368580] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 65.371042] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 65.378031] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 65.380356] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 65.382266] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 65.390713] Bluetooth: hci0: HCI_REQ-0x0c1a [ 65.408828] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 65.411565] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 65.413644] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 65.417408] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 65.420854] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 65.422591] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 65.427994] Bluetooth: hci1: HCI_REQ-0x0c1a [ 65.519445] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 65.521092] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 65.525030] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 65.526313] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 65.542016] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 65.543640] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 65.558512] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 65.560354] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 65.565700] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 65.566928] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 65.574198] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 65.577225] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 65.579164] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 65.583674] Bluetooth: hci3: HCI_REQ-0x0c1a [ 65.584597] Bluetooth: hci2: HCI_REQ-0x0c1a [ 65.648046] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 65.656585] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 65.663002] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 65.664940] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 65.667524] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 65.669255] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 65.670086] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 65.672314] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 65.676438] Bluetooth: hci5: HCI_REQ-0x0c1a [ 65.693152] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 65.697147] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 65.700115] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 65.708945] Bluetooth: hci4: HCI_REQ-0x0c1a [ 67.450815] Bluetooth: hci1: command 0x0409 tx timeout [ 67.450822] Bluetooth: hci0: command 0x0409 tx timeout [ 67.577788] Bluetooth: hci6: Opcode 0x c03 failed: -110 [ 67.642263] Bluetooth: hci2: command 0x0409 tx timeout [ 67.643098] Bluetooth: hci7: Opcode 0x c03 failed: -110 [ 67.643971] Bluetooth: hci3: command 0x0409 tx timeout [ 67.705891] Bluetooth: hci5: command 0x0409 tx timeout [ 67.770764] Bluetooth: hci4: command 0x0409 tx timeout [ 69.498877] Bluetooth: hci0: command 0x041b tx timeout [ 69.499685] Bluetooth: hci1: command 0x041b tx timeout [ 69.690136] Bluetooth: hci3: command 0x041b tx timeout [ 69.690677] Bluetooth: hci2: command 0x041b tx timeout [ 69.753818] Bluetooth: hci5: command 0x041b tx timeout [ 69.817806] Bluetooth: hci4: command 0x041b tx timeout [ 71.545781] Bluetooth: hci1: command 0x040f tx timeout [ 71.546379] Bluetooth: hci0: command 0x040f tx timeout [ 71.737876] Bluetooth: hci2: command 0x040f tx timeout [ 71.738454] Bluetooth: hci3: command 0x040f tx timeout [ 71.801775] Bluetooth: hci5: command 0x040f tx timeout [ 71.865790] Bluetooth: hci4: command 0x040f tx timeout [ 72.697789] Bluetooth: hci6: Opcode 0x c03 failed: -110 [ 72.825847] Bluetooth: hci7: Opcode 0x c03 failed: -110 [ 73.594803] Bluetooth: hci0: command 0x0419 tx timeout [ 73.595449] Bluetooth: hci1: command 0x0419 tx timeout [ 73.786839] Bluetooth: hci3: command 0x0419 tx timeout [ 73.787527] Bluetooth: hci2: command 0x0419 tx timeout [ 73.849777] Bluetooth: hci5: command 0x0419 tx timeout [ 73.914760] Bluetooth: hci4: command 0x0419 tx timeout [ 75.717538] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 75.723704] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 75.728484] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 75.731310] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 75.732579] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 75.734369] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 75.781009] Bluetooth: hci7: HCI_REQ-0x0c1a [ 77.497828] Bluetooth: hci6: Opcode 0x c03 failed: -110 [ 77.817830] Bluetooth: hci7: command 0x0409 tx timeout [ 79.865810] Bluetooth: hci7: command 0x041b tx timeout [ 81.913772] Bluetooth: hci7: command 0x040f tx timeout [ 82.041872] Bluetooth: hci6: Opcode 0x c03 failed: -110 [ 83.961879] Bluetooth: hci7: command 0x0419 tx timeout [ 86.586025] Bluetooth: hci6: Opcode 0x c03 failed: -110 [ 89.479147] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 89.485311] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 89.494896] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 89.508972] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 89.516987] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 89.522931] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 89.533930] Bluetooth: hci6: HCI_REQ-0x0c1a [ 91.577981] Bluetooth: hci6: command 0x0409 tx timeout [ 93.625848] Bluetooth: hci6: command 0x041b tx timeout [ 95.673907] Bluetooth: hci6: command 0x040f tx timeout [ 97.722774] Bluetooth: hci6: command 0x0419 tx timeout 11:50:40 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x14, 0x2, 0x2, 0x101}, 0x14}}, 0x0) 11:50:41 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x14, 0x2, 0x2, 0x101}, 0x14}}, 0x0) 11:50:41 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x4b, &(0x7f0000000040)={0x0, 0x2, 0x0, 0x0, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02']}, 0x18) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) 11:50:41 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x14, 0x2, 0x2, 0x101}, 0x14}}, 0x0) 11:50:41 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x4b, &(0x7f0000000040)={0x0, 0x2, 0x0, 0x0, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02']}, 0x18) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) 11:50:41 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x4b, &(0x7f0000000040)={0x0, 0x2, 0x0, 0x0, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02']}, 0x18) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) 11:50:41 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x4b, &(0x7f0000000040)={0x0, 0x2, 0x0, 0x0, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02']}, 0x18) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) 11:50:41 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x4b, &(0x7f0000000040)={0x0, 0x2, 0x0, 0x0, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02']}, 0x18) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) [ 121.193484] audit: type=1326 audit(1663329044.534:7): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=3653 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fd4abe7db19 code=0x0 [ 121.908307] audit: type=1400 audit(1663329045.250:8): avc: denied { open } for pid=3699 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 121.909880] audit: type=1400 audit(1663329045.250:9): avc: denied { kernel } for pid=3699 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 121.919156] ------------[ cut here ]------------ [ 121.919174] [ 121.919177] ====================================================== [ 121.919180] WARNING: possible circular locking dependency detected [ 121.919184] 6.0.0-rc5-next-20220916 #1 Not tainted [ 121.919190] ------------------------------------------------------ [ 121.919193] syz-executor.0/3700 is trying to acquire lock: [ 121.919199] ffffffff853fa878 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 121.919234] [ 121.919234] but task is already holding lock: [ 121.919237] ffff88803f94d020 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 121.919263] [ 121.919263] which lock already depends on the new lock. [ 121.919263] [ 121.919266] [ 121.919266] the existing dependency chain (in reverse order) is: [ 121.919269] [ 121.919269] -> #3 (&ctx->lock){....}-{2:2}: [ 121.919282] _raw_spin_lock+0x2a/0x40 [ 121.919299] __perf_event_task_sched_out+0x53b/0x18d0 [ 121.919311] __schedule+0xedd/0x2470 [ 121.919322] schedule+0xda/0x1b0 [ 121.919331] exit_to_user_mode_prepare+0x114/0x1a0 [ 121.919351] syscall_exit_to_user_mode+0x19/0x40 [ 121.919368] do_syscall_64+0x48/0x90 [ 121.919382] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 121.919399] [ 121.919399] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 121.919412] _raw_spin_lock_nested+0x30/0x40 [ 121.919427] raw_spin_rq_lock_nested+0x1e/0x30 [ 121.919440] task_fork_fair+0x63/0x4d0 [ 121.919456] sched_cgroup_fork+0x3d0/0x540 [ 121.919470] copy_process+0x4183/0x6e20 [ 121.919480] kernel_clone+0xe7/0x890 [ 121.919490] user_mode_thread+0xad/0xf0 [ 121.919500] rest_init+0x24/0x250 [ 121.919516] arch_call_rest_init+0xf/0x14 [ 121.919528] start_kernel+0x4c1/0x4e6 [ 121.919537] secondary_startup_64_no_verify+0xe0/0xeb [ 121.919551] [ 121.919551] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 121.919564] _raw_spin_lock_irqsave+0x39/0x60 [ 121.919579] try_to_wake_up+0xab/0x1920 [ 121.919592] up+0x75/0xb0 [ 121.919603] __up_console_sem+0x6e/0x80 [ 121.919618] console_unlock+0x46a/0x590 [ 121.919633] vt_ioctl+0x2822/0x2ca0 [ 121.919646] tty_ioctl+0x7c4/0x1700 [ 121.919657] __x64_sys_ioctl+0x19a/0x210 [ 121.919672] do_syscall_64+0x3b/0x90 [ 121.919685] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 121.919702] [ 121.919702] -> #0 ((console_sem).lock){....}-{2:2}: [ 121.919718] __lock_acquire+0x2a02/0x5e70 [ 121.919734] lock_acquire+0x1a2/0x530 [ 121.919749] _raw_spin_lock_irqsave+0x39/0x60 [ 121.919764] down_trylock+0xe/0x70 [ 121.919776] __down_trylock_console_sem+0x3b/0xd0 [ 121.919791] vprintk_emit+0x16b/0x560 [ 121.919807] vprintk+0x84/0xa0 [ 121.919822] _printk+0xba/0xf1 [ 121.919840] report_bug.cold+0x72/0xab [ 121.919852] handle_bug+0x3c/0x70 [ 121.919865] exc_invalid_op+0x14/0x50 [ 121.919878] asm_exc_invalid_op+0x16/0x20 [ 121.919894] group_sched_out.part.0+0x2c7/0x460 [ 121.919904] ctx_sched_out+0x8f1/0xc10 [ 121.919914] __perf_event_task_sched_out+0x6d0/0x18d0 [ 121.919926] __schedule+0xedd/0x2470 [ 121.919936] schedule+0xda/0x1b0 [ 121.919945] exit_to_user_mode_prepare+0x114/0x1a0 [ 121.919964] syscall_exit_to_user_mode+0x19/0x40 [ 121.919981] do_syscall_64+0x48/0x90 [ 121.919993] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 121.920010] [ 121.920010] other info that might help us debug this: [ 121.920010] [ 121.920013] Chain exists of: [ 121.920013] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 121.920013] [ 121.920027] Possible unsafe locking scenario: [ 121.920027] [ 121.920030] CPU0 CPU1 [ 121.920032] ---- ---- [ 121.920034] lock(&ctx->lock); [ 121.920039] lock(&rq->__lock); [ 121.920046] lock(&ctx->lock); [ 121.920052] lock((console_sem).lock); [ 121.920057] [ 121.920057] *** DEADLOCK *** [ 121.920057] [ 121.920059] 2 locks held by syz-executor.0/3700: [ 121.920066] #0: ffff88806cf37cd8 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 121.920092] #1: ffff88803f94d020 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 121.920119] [ 121.920119] stack backtrace: [ 121.920121] CPU: 1 PID: 3700 Comm: syz-executor.0 Not tainted 6.0.0-rc5-next-20220916 #1 [ 121.920134] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 121.920142] Call Trace: [ 121.920146] [ 121.920151] dump_stack_lvl+0x8b/0xb3 [ 121.920167] check_noncircular+0x263/0x2e0 [ 121.920185] ? format_decode+0x26c/0xb50 [ 121.920200] ? print_circular_bug+0x450/0x450 [ 121.920216] ? enable_ptr_key_workfn+0x20/0x20 [ 121.920231] ? format_decode+0x26c/0xb50 [ 121.920247] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 121.920264] __lock_acquire+0x2a02/0x5e70 [ 121.920285] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 121.920307] lock_acquire+0x1a2/0x530 [ 121.920323] ? down_trylock+0xe/0x70 [ 121.920338] ? rcu_read_unlock+0x40/0x40 [ 121.920358] ? vprintk+0x84/0xa0 [ 121.920375] _raw_spin_lock_irqsave+0x39/0x60 [ 121.920391] ? down_trylock+0xe/0x70 [ 121.920404] down_trylock+0xe/0x70 [ 121.920417] ? vprintk+0x84/0xa0 [ 121.920433] __down_trylock_console_sem+0x3b/0xd0 [ 121.920450] vprintk_emit+0x16b/0x560 [ 121.920469] vprintk+0x84/0xa0 [ 121.920486] _printk+0xba/0xf1 [ 121.920503] ? record_print_text.cold+0x16/0x16 [ 121.920525] ? report_bug.cold+0x66/0xab [ 121.920539] ? group_sched_out.part.0+0x2c7/0x460 [ 121.920551] report_bug.cold+0x72/0xab [ 121.920566] handle_bug+0x3c/0x70 [ 121.920579] exc_invalid_op+0x14/0x50 [ 121.920594] asm_exc_invalid_op+0x16/0x20 [ 121.920611] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 121.920624] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 121.920636] RSP: 0018:ffff888039d1fc48 EFLAGS: 00010006 [ 121.920645] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 121.920652] RDX: ffff88801b0c1ac0 RSI: ffffffff81566027 RDI: 0000000000000005 [ 121.920660] RBP: ffff888040238000 R08: 0000000000000005 R09: 0000000000000001 [ 121.920667] R10: 0000000000000000 R11: ffffffff865ac05b R12: ffff88803f94d000 [ 121.920681] R13: ffff88806cf3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 121.920692] ? group_sched_out.part.0+0x2c7/0x460 [ 121.920705] ? group_sched_out.part.0+0x2c7/0x460 [ 121.920718] ctx_sched_out+0x8f1/0xc10 [ 121.920730] __perf_event_task_sched_out+0x6d0/0x18d0 [ 121.920745] ? lock_is_held_type+0xd7/0x130 [ 121.920764] ? __perf_cgroup_move+0x160/0x160 [ 121.920775] ? set_next_entity+0x304/0x550 [ 121.920793] ? update_curr+0x267/0x740 [ 121.920811] ? lock_is_held_type+0xd7/0x130 [ 121.920829] __schedule+0xedd/0x2470 [ 121.920843] ? io_schedule_timeout+0x150/0x150 [ 121.920856] ? rcu_read_lock_sched_held+0x3e/0x80 [ 121.920875] schedule+0xda/0x1b0 [ 121.920887] exit_to_user_mode_prepare+0x114/0x1a0 [ 121.920907] syscall_exit_to_user_mode+0x19/0x40 [ 121.920925] do_syscall_64+0x48/0x90 [ 121.920939] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 121.920956] RIP: 0033:0x7f87cc408b19 [ 121.920965] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 121.920976] RSP: 002b:00007f87c997e218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 121.920986] RAX: 0000000000000001 RBX: 00007f87cc51bf68 RCX: 00007f87cc408b19 [ 121.920994] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f87cc51bf6c [ 121.921001] RBP: 00007f87cc51bf60 R08: 000000000000000e R09: 0000000000000000 [ 121.921008] R10: 0000000000000005 R11: 0000000000000246 R12: 00007f87cc51bf6c [ 121.921015] R13: 00007ffc6f70aacf R14: 00007f87c997e300 R15: 0000000000022000 [ 121.921028] [ 121.974417] WARNING: CPU: 1 PID: 3700 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 121.975082] Modules linked in: [ 121.975322] CPU: 1 PID: 3700 Comm: syz-executor.0 Not tainted 6.0.0-rc5-next-20220916 #1 [ 121.975902] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 121.976721] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 121.977113] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 121.978425] RSP: 0018:ffff888039d1fc48 EFLAGS: 00010006 [ 121.978812] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 121.979322] RDX: ffff88801b0c1ac0 RSI: ffffffff81566027 RDI: 0000000000000005 [ 121.979831] RBP: ffff888040238000 R08: 0000000000000005 R09: 0000000000000001 [ 121.980352] R10: 0000000000000000 R11: ffffffff865ac05b R12: ffff88803f94d000 [ 121.980873] R13: ffff88806cf3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 121.981382] FS: 00007f87c997e700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 121.981965] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 121.982382] CR2: 00007f82c977a008 CR3: 0000000020740000 CR4: 0000000000350ee0 [ 121.982894] Call Trace: [ 121.983084] [ 121.983251] ctx_sched_out+0x8f1/0xc10 [ 121.983540] __perf_event_task_sched_out+0x6d0/0x18d0 [ 121.983921] ? lock_is_held_type+0xd7/0x130 [ 121.984244] ? __perf_cgroup_move+0x160/0x160 [ 121.984577] ? set_next_entity+0x304/0x550 [ 121.984910] ? update_curr+0x267/0x740 [ 121.985204] ? lock_is_held_type+0xd7/0x130 [ 121.985526] __schedule+0xedd/0x2470 [ 121.985800] ? io_schedule_timeout+0x150/0x150 [ 121.986140] ? rcu_read_lock_sched_held+0x3e/0x80 [ 121.986505] schedule+0xda/0x1b0 [ 121.986763] exit_to_user_mode_prepare+0x114/0x1a0 [ 121.987128] syscall_exit_to_user_mode+0x19/0x40 [ 121.987482] do_syscall_64+0x48/0x90 [ 121.987760] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 121.988143] RIP: 0033:0x7f87cc408b19 [ 121.988419] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 121.989728] RSP: 002b:00007f87c997e218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 121.990276] RAX: 0000000000000001 RBX: 00007f87cc51bf68 RCX: 00007f87cc408b19 [ 121.990787] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f87cc51bf6c [ 121.991305] RBP: 00007f87cc51bf60 R08: 000000000000000e R09: 0000000000000000 [ 121.991816] R10: 0000000000000005 R11: 0000000000000246 R12: 00007f87cc51bf6c [ 121.992333] R13: 00007ffc6f70aacf R14: 00007f87c997e300 R15: 0000000000022000 [ 121.992852] [ 121.993020] irq event stamp: 1376 [ 121.993267] hardirqs last enabled at (1375): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 121.993938] hardirqs last disabled at (1376): [] __schedule+0x1225/0x2470 [ 121.994522] softirqs last enabled at (1240): [] __irq_exit_rcu+0x11b/0x180 [ 121.995135] softirqs last disabled at (1195): [] __irq_exit_rcu+0x11b/0x180 [ 121.995741] ---[ end trace 0000000000000000 ]--- [ 127.602399] audit: type=1326 audit(1663329050.944:10): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=3976 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fd4abe7db19 code=0x0 11:50:50 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x0, 0x30) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1804f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 11:50:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8921, &(0x7f0000000000)={'lo\x00'}) 11:50:50 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x4b, &(0x7f0000000040)={0x0, 0x2, 0x0, 0x0, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02']}, 0x18) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) 11:50:50 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000000c0)=0x3, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000140)={@multicast, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x1c, 0x0, @opaque="e3704100000000da07dbd83db8f73dc34f1079e4"}}}}}, 0x0) 11:50:50 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0xbe, &(0x7f00000001c0)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0xe20, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "0cb0fae138cd1f2e03243f93be39f2c6d2a536c1f5f8d74a43b4c0bc27497234", "c04746ec5b12cf97d11a8bb546b56bcb9d3d359d9d4acaff8add614d1e90e4eab444f4e0c00eae0446225ae1436cfdf0", "ea96db76c1999c1a572451cf464ab9976bb3f922008ab90918dd869e", {"fba05ec01197a4559adff2fa54ac3691", "c0244d2350165cdb4de9cebb63137649"}}}}}}}, 0x0) 11:50:50 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000100)=[{0x20, 0x0, 0x0, 0x8}, {0x6}]}) 11:50:50 executing program 3: syz_emit_ethernet(0x26, &(0x7f0000000000)={@remote, @link_local, @void, {@arp={0x4305, @generic={0x30f, 0x0, 0x6, 0x0, 0x0, @link_local, "", @remote, "4815e7a6"}}}}, 0x0) 11:50:50 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x22, &(0x7f0000000500)={[{}]}) 11:50:50 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000000c0)=0x3, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000140)={@multicast, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x1c, 0x0, @opaque="e3704100000000da07dbd83db8f73dc34f1079e4"}}}}}, 0x0) 11:50:51 executing program 3: syz_emit_ethernet(0x26, &(0x7f0000000000)={@remote, @link_local, @void, {@arp={0x4305, @generic={0x30f, 0x0, 0x6, 0x0, 0x0, @link_local, "", @remote, "4815e7a6"}}}}, 0x0) 11:50:51 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000100)=[{0x20, 0x0, 0x0, 0x8}, {0x6}]}) 11:50:51 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0xbe, &(0x7f00000001c0)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0xe20, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "0cb0fae138cd1f2e03243f93be39f2c6d2a536c1f5f8d74a43b4c0bc27497234", "c04746ec5b12cf97d11a8bb546b56bcb9d3d359d9d4acaff8add614d1e90e4eab444f4e0c00eae0446225ae1436cfdf0", "ea96db76c1999c1a572451cf464ab9976bb3f922008ab90918dd869e", {"fba05ec01197a4559adff2fa54ac3691", "c0244d2350165cdb4de9cebb63137649"}}}}}}}, 0x0) [ 127.710543] audit: type=1326 audit(1663329051.052:11): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=3996 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fd4abe7db19 code=0x0 11:50:51 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x0, 0x30) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1804f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 11:50:51 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x22, &(0x7f0000000500)={[{}]}) 11:50:51 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x0, 0x30) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1804f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 11:50:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8921, &(0x7f0000000000)={'lo\x00'}) 11:50:51 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000000c0)=0x3, 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000140)={@multicast, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x1c, 0x0, @opaque="e3704100000000da07dbd83db8f73dc34f1079e4"}}}}}, 0x0) 11:50:51 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0xbe, &(0x7f00000001c0)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0xe20, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "0cb0fae138cd1f2e03243f93be39f2c6d2a536c1f5f8d74a43b4c0bc27497234", "c04746ec5b12cf97d11a8bb546b56bcb9d3d359d9d4acaff8add614d1e90e4eab444f4e0c00eae0446225ae1436cfdf0", "ea96db76c1999c1a572451cf464ab9976bb3f922008ab90918dd869e", {"fba05ec01197a4559adff2fa54ac3691", "c0244d2350165cdb4de9cebb63137649"}}}}}}}, 0x0) 11:50:51 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000100)=[{0x20, 0x0, 0x0, 0x8}, {0x6}]}) 11:50:51 executing program 3: syz_emit_ethernet(0x26, &(0x7f0000000000)={@remote, @link_local, @void, {@arp={0x4305, @generic={0x30f, 0x0, 0x6, 0x0, 0x0, @link_local, "", @remote, "4815e7a6"}}}}, 0x0) 11:50:51 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x0, 0x30) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1804f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 11:50:51 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x22, &(0x7f0000000500)={[{}]}) [ 127.977392] audit: type=1326 audit(1663329051.319:12): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=4008 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fd4abe7db19 code=0x0 11:50:51 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x0, 0x30) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1804f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) [ 128.043735] hrtimer: interrupt took 16511 ns 11:50:51 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0xbe, &(0x7f00000001c0)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0xe20, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "0cb0fae138cd1f2e03243f93be39f2c6d2a536c1f5f8d74a43b4c0bc27497234", "c04746ec5b12cf97d11a8bb546b56bcb9d3d359d9d4acaff8add614d1e90e4eab444f4e0c00eae0446225ae1436cfdf0", "ea96db76c1999c1a572451cf464ab9976bb3f922008ab90918dd869e", {"fba05ec01197a4559adff2fa54ac3691", "c0244d2350165cdb4de9cebb63137649"}}}}}}}, 0x0) [ 128.328700] loop6: detected capacity change from 0 to 5152 11:50:51 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x0, 0x30) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1804f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 11:50:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8921, &(0x7f0000000000)={'lo\x00'}) 11:50:51 executing program 7: syslog(0x3, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000000000018000000", @ANYRES32=r0, @ANYBLOB="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"]) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="ff05002179043f5918d8d6000000000000ffff"], 0x1c}}, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r2) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)={0x24, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8, 0x3, r5}, @void}}}, 0x24}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000180)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)={0x24, r7, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8, 0x3, r8}, @void}}}, 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRESOCT=r7, @ANYRESHEX, @ANYRES16=r1, @ANYRES32, @ANYRES64, @ANYRESHEX=r2, @ANYRESOCT=r3, @ANYRES64=r3], 0x238}, 0x1, 0x0, 0x0, 0x8000}, 0x306a1cde6450d9e3) kcmp(0xffffffffffffffff, 0x0, 0x4, r3, r2) 11:50:51 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736672d59600088001000240000004f801002000400000000000000000008000"/64, 0x40}, {&(0x7f0000010100)="f8ffff00f0ffffffffffffff00"/32, 0x20, 0x800}, {&(0x7f0000010200)="f8ffff00f0ffffffffffffff00"/32, 0x20, 0x1000}, {&(0x7f0000010300)="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", 0x120, 0x1800}, {&(0x7f0000010500)="2e2020202020202020202010000eeb70325132510000eb7032510300000000002e2e20202020202020202010000eeb70325132510000eb70325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c453020202020202020000eeb70325132510000eb70325104001a040000", 0x80, 0x42000}, {&(0x7f0000010600)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x82000}, {&(0x7f0000010b00)='syzkallers\x00'/32, 0x20, 0xc2000}, {&(0x7f0000010c00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x142000}], 0x0, &(0x7f0000010d00)) 11:50:51 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x0, 0x30) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1804f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 11:50:51 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x0, 0x30) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1804f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 11:50:51 executing program 2: r0 = fsopen(&(0x7f00000001c0)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000200)='hugetlbfs\x00', &(0x7f0000000240)='/dev/bsg\x00', 0x0) read(r0, 0x0, 0x2b) 11:50:51 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000003580)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=[{0x10, 0x1, 0x2}], 0x10}}], 0x2, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = dup(r1) sendmsg$nl_xfrm(r2, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={&(0x7f0000000000)=ANY=[@ANYBLOB="681100001c00018201b87f5001533eff132c0029bd7000fcdbdf2533"], 0x1168}}, 0x0) [ 128.412989] netlink: 4436 bytes leftover after parsing attributes in process `syz-executor.1'. 11:50:51 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000000)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 11:50:51 executing program 2: r0 = fsopen(&(0x7f00000001c0)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000200)='hugetlbfs\x00', &(0x7f0000000240)='/dev/bsg\x00', 0x0) read(r0, 0x0, 0x2b) [ 128.423779] netlink: 4436 bytes leftover after parsing attributes in process `syz-executor.1'. 11:50:51 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000003580)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=[{0x10, 0x1, 0x2}], 0x10}}], 0x2, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = dup(r1) sendmsg$nl_xfrm(r2, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={&(0x7f0000000000)=ANY=[@ANYBLOB="681100001c00018201b87f5001533eff132c0029bd7000fcdbdf2533"], 0x1168}}, 0x0) 11:50:51 executing program 2: r0 = fsopen(&(0x7f00000001c0)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000200)='hugetlbfs\x00', &(0x7f0000000240)='/dev/bsg\x00', 0x0) read(r0, 0x0, 0x2b) [ 128.544060] netlink: 4436 bytes leftover after parsing attributes in process `syz-executor.1'. 11:50:52 executing program 6: ioctl$CDROMCLOSETRAY(0xffffffffffffffff, 0x5319) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) sendmsg$NL80211_CMD_ABORT_SCAN(0xffffffffffffffff, 0x0, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000e40), 0x800, 0x0) 11:50:52 executing program 2: r0 = fsopen(&(0x7f00000001c0)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000200)='hugetlbfs\x00', &(0x7f0000000240)='/dev/bsg\x00', 0x0) read(r0, 0x0, 0x2b) 11:50:52 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000003580)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=[{0x10, 0x1, 0x2}], 0x10}}], 0x2, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = dup(r1) sendmsg$nl_xfrm(r2, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={&(0x7f0000000000)=ANY=[@ANYBLOB="681100001c00018201b87f5001533eff132c0029bd7000fcdbdf2533"], 0x1168}}, 0x0) 11:50:52 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000003580)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=[{0x10, 0x1, 0x2}], 0x10}}], 0x2, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = dup(r1) sendmsg$nl_xfrm(r2, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={&(0x7f0000000000)=ANY=[@ANYBLOB="681100001c00018201b87f5001533eff132c0029bd7000fcdbdf2533"], 0x1168}}, 0x0) 11:50:52 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x0, 0x30) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1804f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 11:50:52 executing program 7: syslog(0x3, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000000000018000000", @ANYRES32=r0, @ANYBLOB="0000002e2f66b96c6530000000000400c955e8b0a36e640dc7abb60954db91d7489e5a0e53ce665f119ca39e6c11e90872f60b22487d95045f4721dce73d1b551f345bb4b6cf562f20e8ae2daf84cf53c042f47236528f24c1127a12e0d1db4d0f52efcbd72e16e488d25accd9d25624d6e580a7af4545901f2f1ed61d795752a84ea8049102cbbc86936dd5a79155bdb5724a29784afaa5c7809c556b27047c51f9e141740204014f2d7ad51f1a13a0bbc31450716981b93a5de18e8382c35a379b8dae7a60df65f57fdf5f883d43e09149586ba8b3880cb9ad898d4401a708a0ea72bd887c410ff86c61e78af5291b9f4047c6e20d2f7811d3c03e37782e9aed9b03a91244a2cecf5eddbcf8e400d24ab0cef71c62181d963ff7a62846a5b815b67f8d94c4d65dfcb14f06eab85b157e3e2f602a0408fd00ed298670e685c8ea4ec27f271eefb57d9a599a68a3aaf256ce93e07f70227e5113e0addd6413cfdfced32d1124f5d5655107643fa6db7a598b45a11550fa4c3a0e05b14a9faf731a57d5c5fcde004f2fbe8927f98f36fb2f8be2a0bb9efffdf458979a792dc7"]) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="ff05002179043f5918d8d6000000000000ffff"], 0x1c}}, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r2) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)={0x24, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8, 0x3, r5}, @void}}}, 0x24}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000180)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)={0x24, r7, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8, 0x3, r8}, @void}}}, 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRESOCT=r7, @ANYRESHEX, @ANYRES16=r1, @ANYRES32, @ANYRES64, @ANYRESHEX=r2, @ANYRESOCT=r3, @ANYRES64=r3], 0x238}, 0x1, 0x0, 0x0, 0x8000}, 0x306a1cde6450d9e3) kcmp(0xffffffffffffffff, 0x0, 0x4, r3, r2) 11:50:52 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$netlink(r0, 0x10e, 0x4, &(0x7f0000000f80)=""/251, &(0x7f0000001080)=0xfb) [ 128.886475] netlink: 4436 bytes leftover after parsing attributes in process `syz-executor.1'. 11:50:52 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000003580)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=[{0x10, 0x1, 0x2}], 0x10}}], 0x2, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = dup(r1) sendmsg$nl_xfrm(r2, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={&(0x7f0000000000)=ANY=[@ANYBLOB="681100001c00018201b87f5001533eff132c0029bd7000fcdbdf2533"], 0x1168}}, 0x0) 11:50:52 executing program 5: io_setup(0x5, &(0x7f0000001540)) 11:50:52 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f00000033c0)=[{{&(0x7f0000000340)=@qipcrtr={0x2a, 0x3}, 0x80, 0x0}}, {{&(0x7f0000000500)=@generic={0x0, "0599ab8f961fc03a8833990bd74e8d3e2fa5a2311a53ee9a6f07b68d2ff56d9a6d8f6945a5d463529962360797ea68e2983a348adb01d45529063cec6fa483a683cd53cd8e1516c9c3c7bd3b6b760540be1c7b68b31dc8b9920bb5b43103de15063cb29e6bd97cdb737e05e4e11d0791e5405d4e1b653cde58eb0a45d16b"}, 0xc, &(0x7f0000001a40), 0x5d}}], 0x2, 0x0) [ 128.939970] netlink: 4436 bytes leftover after parsing attributes in process `syz-executor.4'. 11:50:52 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) 11:50:52 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f00000033c0)=[{{&(0x7f0000000340)=@qipcrtr={0x2a, 0x3}, 0x80, 0x0}}, {{&(0x7f0000000500)=@generic={0x0, "0599ab8f961fc03a8833990bd74e8d3e2fa5a2311a53ee9a6f07b68d2ff56d9a6d8f6945a5d463529962360797ea68e2983a348adb01d45529063cec6fa483a683cd53cd8e1516c9c3c7bd3b6b760540be1c7b68b31dc8b9920bb5b43103de15063cb29e6bd97cdb737e05e4e11d0791e5405d4e1b653cde58eb0a45d16b"}, 0xc, &(0x7f0000001a40), 0x5d}}], 0x2, 0x0) 11:50:52 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 11:50:52 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000003580)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=[{0x10, 0x1, 0x2}], 0x10}}], 0x2, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = dup(r1) sendmsg$nl_xfrm(r2, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={&(0x7f0000000000)=ANY=[@ANYBLOB="681100001c00018201b87f5001533eff132c0029bd7000fcdbdf2533"], 0x1168}}, 0x0) 11:50:52 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$netlink(r0, 0x10e, 0x4, &(0x7f0000000f80)=""/251, &(0x7f0000001080)=0xfb) [ 129.017346] netlink: 4436 bytes leftover after parsing attributes in process `syz-executor.1'. [ 129.043644] audit: type=1400 audit(1663329052.385:13): avc: denied { write } for pid=4098 comm="syz-executor.5" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 11:50:52 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) [ 129.069401] netlink: 4436 bytes leftover after parsing attributes in process `syz-executor.4'. 11:50:52 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f00000033c0)=[{{&(0x7f0000000340)=@qipcrtr={0x2a, 0x3}, 0x80, 0x0}}, {{&(0x7f0000000500)=@generic={0x0, "0599ab8f961fc03a8833990bd74e8d3e2fa5a2311a53ee9a6f07b68d2ff56d9a6d8f6945a5d463529962360797ea68e2983a348adb01d45529063cec6fa483a683cd53cd8e1516c9c3c7bd3b6b760540be1c7b68b31dc8b9920bb5b43103de15063cb29e6bd97cdb737e05e4e11d0791e5405d4e1b653cde58eb0a45d16b"}, 0xc, &(0x7f0000001a40), 0x5d}}], 0x2, 0x0) 11:50:52 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$netlink(r0, 0x10e, 0x4, &(0x7f0000000f80)=""/251, &(0x7f0000001080)=0xfb) 11:50:52 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000003580)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=[{0x10, 0x1, 0x2}], 0x10}}], 0x2, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = dup(r1) sendmsg$nl_xfrm(r2, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={&(0x7f0000000000)=ANY=[@ANYBLOB="681100001c00018201b87f5001533eff132c0029bd7000fcdbdf2533"], 0x1168}}, 0x0) 11:50:52 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) 11:50:52 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f00000033c0)=[{{&(0x7f0000000340)=@qipcrtr={0x2a, 0x3}, 0x80, 0x0}}, {{&(0x7f0000000500)=@generic={0x0, "0599ab8f961fc03a8833990bd74e8d3e2fa5a2311a53ee9a6f07b68d2ff56d9a6d8f6945a5d463529962360797ea68e2983a348adb01d45529063cec6fa483a683cd53cd8e1516c9c3c7bd3b6b760540be1c7b68b31dc8b9920bb5b43103de15063cb29e6bd97cdb737e05e4e11d0791e5405d4e1b653cde58eb0a45d16b"}, 0xc, &(0x7f0000001a40), 0x5d}}], 0x2, 0x0) 11:50:52 executing program 1: keyctl$set_reqkey_keyring(0xe, 0x1) keyctl$set_reqkey_keyring(0xe, 0x1) 11:50:52 executing program 7: syslog(0x3, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000000000018000000", @ANYRES32=r0, @ANYBLOB="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"]) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="ff05002179043f5918d8d6000000000000ffff"], 0x1c}}, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r2) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)={0x24, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8, 0x3, r5}, @void}}}, 0x24}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000180)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)={0x24, r7, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8, 0x3, r8}, @void}}}, 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRESOCT=r7, @ANYRESHEX, @ANYRES16=r1, @ANYRES32, @ANYRES64, @ANYRESHEX=r2, @ANYRESOCT=r3, @ANYRES64=r3], 0x238}, 0x1, 0x0, 0x0, 0x8000}, 0x306a1cde6450d9e3) kcmp(0xffffffffffffffff, 0x0, 0x4, r3, r2) 11:50:52 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$netlink(r0, 0x10e, 0x4, &(0x7f0000000f80)=""/251, &(0x7f0000001080)=0xfb) 11:50:52 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) [ 129.366408] netlink: 4436 bytes leftover after parsing attributes in process `syz-executor.4'. 11:50:52 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 11:50:52 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) 11:50:52 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 11:50:52 executing program 1: keyctl$set_reqkey_keyring(0xe, 0x1) keyctl$set_reqkey_keyring(0xe, 0x1) 11:50:52 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 11:50:52 executing program 4: keyctl$set_reqkey_keyring(0xe, 0x1) keyctl$set_reqkey_keyring(0xe, 0x1) 11:50:52 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 11:50:52 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 11:50:52 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) [ 129.746611] syz-executor.7 (4121) used greatest stack depth: 23192 bytes left 11:50:53 executing program 1: keyctl$set_reqkey_keyring(0xe, 0x1) keyctl$set_reqkey_keyring(0xe, 0x1) 11:50:53 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 11:50:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 11:50:53 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 11:50:53 executing program 7: syslog(0x3, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000000000018000000", @ANYRES32=r0, @ANYBLOB="0000002e2f66b96c6530000000000400c955e8b0a36e640dc7abb60954db91d7489e5a0e53ce665f119ca39e6c11e90872f60b22487d95045f4721dce73d1b551f345bb4b6cf562f20e8ae2daf84cf53c042f47236528f24c1127a12e0d1db4d0f52efcbd72e16e488d25accd9d25624d6e580a7af4545901f2f1ed61d795752a84ea8049102cbbc86936dd5a79155bdb5724a29784afaa5c7809c556b27047c51f9e141740204014f2d7ad51f1a13a0bbc31450716981b93a5de18e8382c35a379b8dae7a60df65f57fdf5f883d43e09149586ba8b3880cb9ad898d4401a708a0ea72bd887c410ff86c61e78af5291b9f4047c6e20d2f7811d3c03e37782e9aed9b03a91244a2cecf5eddbcf8e400d24ab0cef71c62181d963ff7a62846a5b815b67f8d94c4d65dfcb14f06eab85b157e3e2f602a0408fd00ed298670e685c8ea4ec27f271eefb57d9a599a68a3aaf256ce93e07f70227e5113e0addd6413cfdfced32d1124f5d5655107643fa6db7a598b45a11550fa4c3a0e05b14a9faf731a57d5c5fcde004f2fbe8927f98f36fb2f8be2a0bb9efffdf458979a792dc7"]) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="ff05002179043f5918d8d6000000000000ffff"], 0x1c}}, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r2) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)={0x24, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8, 0x3, r5}, @void}}}, 0x24}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000180)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)={0x24, r7, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8, 0x3, r8}, @void}}}, 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRESOCT=r7, @ANYRESHEX, @ANYRES16=r1, @ANYRES32, @ANYRES64, @ANYRESHEX=r2, @ANYRESOCT=r3, @ANYRES64=r3], 0x238}, 0x1, 0x0, 0x0, 0x8000}, 0x306a1cde6450d9e3) kcmp(0xffffffffffffffff, 0x0, 0x4, r3, r2) 11:50:53 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 11:50:53 executing program 4: keyctl$set_reqkey_keyring(0xe, 0x1) keyctl$set_reqkey_keyring(0xe, 0x1) 11:50:53 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 11:50:53 executing program 1: keyctl$set_reqkey_keyring(0xe, 0x1) keyctl$set_reqkey_keyring(0xe, 0x1) 11:50:53 executing program 4: keyctl$set_reqkey_keyring(0xe, 0x1) keyctl$set_reqkey_keyring(0xe, 0x1) 11:50:53 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 11:50:53 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 11:50:53 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 11:50:53 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 11:50:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 11:50:53 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 11:50:53 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 11:50:53 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="fd", 0x1, r0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="010d0417ffffffffffff0026a15cc87649ee1dabb665995ea853c1"], 0x1b) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x7, 0x3, 0x0, 0x7ff, 0x10, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x18406, 0x144, 0x6, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3f, 0x3f, 0x0, 0x7, 0x0, 0x6, 0x80100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x485c0, 0x0, 0x6, 0x1, 0x5, 0x10040000, 0xffff, 0x0, 0x7, 0x0, 0x2a2}, 0x0, 0xffffffffffffffff, r2, 0x8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1, @pin_code_reply={{0x40d, 0x17}, {@none, 0x0, "267fb66ad5d9d436633c57535ea853c1"}}}, 0x1b) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 11:50:53 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r1 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000280)={{r0}, 0x0, 0x4, @unused=[0x3b6f8fa9, 0x9, 0x8001, 0x6], @name="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 VM DIAGNOSIS: 11:50:45 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=0000000000120011 RCX=0000000000120012 RDX=ffff888038643440 RSI=ffffea0000e19080 RDI=0000000048800000 RBP=ffffea0000e19080 RSP=ffff8880182dfac0 R8 =0000000000000001 R9 =0000000080120011 R10=ffffea0000e19080 R11=0000000000000001 R12=0000000000000000 R13=ffff888007c4f780 R14=ffff888038643440 R15=ffff888038643440 RIP=ffffffff81783d77 RFL=00000282 [--S----] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f7c4eb21260 CR3=000000001b0e0000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 756e696c2d34365f 3638782f62696c2f YMM01=0000000000000000 0000000000000000 2e6f747079726362 696c2f756e672d78 YMM02=0000000000000000 0000000000000000 00312e312e6f732e 6f74707972636269 YMM03=0000000000000000 0000000000000000 6c2f756e672d7875 6e696c2d34365f36 YMM04=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000020 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b3251 RDI=ffffffff87641ba0 RBP=ffffffff87641b60 RSP=ffff888039d1f698 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000020 R11=0000000000000001 R12=0000000000000020 R13=ffffffff87641b60 R14=0000000000000010 R15=ffffffff822b3240 RIP=ffffffff822b32a9 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f87c997e700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f82c977a008 CR3=0000000020740000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f87cc4ef7c0 00007f87cc4ef7c8 YMM02=0000000000000000 0000000000000000 00007f87cc4ef7e0 00007f87cc4ef7c0 YMM03=0000000000000000 0000000000000000 00007f87cc4ef7c8 00007f87cc4ef7c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000