enat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:19:27 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3", 0xae, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) [ 2903.428329] SELinux: security_context_str_to_sid (root) failed with errno=-22 [ 2903.437120] Bluetooth: hci7: unexpected event 0x2f length: 763 > 260 17:19:27 executing program 7: sched_getaffinity(0x0, 0x0, 0x0) [ 2903.474567] Bluetooth: hci1: unexpected event for opcode 0x043d [ 2903.498164] Bluetooth: hci4: unexpected event for opcode 0x043d 17:19:27 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x5000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) 17:19:27 executing program 6: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000240)) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xff, 0x5, 0x40, 0x0, 0x0, 0x905, 0x90000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000180), 0x1}, 0x10080, 0x3, 0x3, 0x6, 0x0, 0x1, 0x6, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000280)=""/52, 0x34}, {&(0x7f00000002c0)=""/117, 0x75}], 0x2, &(0x7f0000000440)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xa8}, 0x101) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0x2fb}, {0x3, [{@none, 0x9, 0x8, "c30c5b", 0xe, 0x2, "db30ba492ae7cebc05283ff7316f6f210553ec196d4a18ecf5d01dc1bf997ef13579191093ad7c2097050b9b51724181ceacef3154a0e7263bc3589c93be7217c652e0837c4276244b75a00d7d152938e796920a4def61bae4095fb54159a062fd16816dc45c62affc0a91db419bbaeab0975ae432f34d200d365d0df346882e2c547258e57cab65b7477097aec25c74fd123058f55e16b6a37b2da87d7804ccb4c46e8c72ea562bc610c7c24a1d06577f0b55e43d6f6df8af0fd111dff06245bdbacef41a361bf59e6d1c39bd00d0e256fd63c4e234416496c3c3aae648f90660982ffc989e8bf6535c8c9f54dbf7c9"}, {@none, 0x8, 0x2, "be9062", 0xffff, 0x20, "905437d3d595cef0aaddc24c198d21da2e559e8ceea935ca0cc2bb3c50d251cede2879f4742da415d31e433ccd749d97ac9d5511aed33818670bf375619b445aba4d30d433419a8de40baab45d0bb19131cbcd36c9d89768ab553c523911d65dfb5384c7e31a605fedddda1fbd9ca0e429ef1e6bc5fd1f1264310286db8cab41b9f3eeace60adb6ef3166026fbf121cbe230add184291c6c62de1108a549398b453e6de250f37dd13eaf960af6943781ab29d10ab1f4155a69d7164cec6ca60b8a2d65c59bcac3c9a267876ec6b36fdce05a9cf05aac99b38f9dec79e52cbd80a6194cb7289c9422c2b2f6a5e400069b"}, {@any, 0x3f, 0x2, "c8cb31", 0x5, 0x8, "142becfa424a96392837d6de6a98beb9b0af98d964bb865618d8885489e2de073e6e492647c2896e79806eff15f892cf0b6f425ab8f842b950bb7ef335a9dda721da9a36eb0879fe1a0f56930d4ba2e5cc7ad29684b8e7a313f1845e7c73fe11d38fc793756c955b909781f7f2e876712fde22b2d6de50bf65e5454e288a9e199afec2080cd471282980ffba68b76ea3111a5ab279c3b71e748bd7516c3dc649fee99b885cbfdba7ac552dce4941714b924f21324284b53ca5413568a035234032f4d438df9fbdaa17752980ead81e1c880fe3daf28af5e5b8c34f560bca94f75e318a346a88d82a12f3c0e9d279b8ef"}]}}}, 0x2fe) 17:19:27 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc", 0x56, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) [ 2903.623290] Bluetooth: hci7: unexpected event 0x2f length: 763 > 260 [ 2903.627321] SELinux: security_context_str_to_sid (root) failed with errno=-22 [ 2903.642163] loop1: detected capacity change from 0 to 40 [ 2903.750132] Bluetooth: hci1: unexpected event for opcode 0x043d [ 2917.017995] SELinux: security_context_str_to_sid (root) failed with errno=-22 17:19:41 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89", 0x81, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:19:41 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:19:41 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:19:41 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x6000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) 17:19:41 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:19:41 executing program 7: sched_getaffinity(0x0, 0x0, 0x0) 17:19:41 executing program 6: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000240)) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xff, 0x5, 0x40, 0x0, 0x0, 0x905, 0x90000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000180), 0x1}, 0x10080, 0x3, 0x3, 0x6, 0x0, 0x1, 0x6, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000280)=""/52, 0x34}, {&(0x7f00000002c0)=""/117, 0x75}], 0x2, &(0x7f0000000440)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xa8}, 0x101) syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0x2fb}, {0x3, [{@none, 0x9, 0x8, "c30c5b", 0xe, 0x2, "db30ba492ae7cebc05283ff7316f6f210553ec196d4a18ecf5d01dc1bf997ef13579191093ad7c2097050b9b51724181ceacef3154a0e7263bc3589c93be7217c652e0837c4276244b75a00d7d152938e796920a4def61bae4095fb54159a062fd16816dc45c62affc0a91db419bbaeab0975ae432f34d200d365d0df346882e2c547258e57cab65b7477097aec25c74fd123058f55e16b6a37b2da87d7804ccb4c46e8c72ea562bc610c7c24a1d06577f0b55e43d6f6df8af0fd111dff06245bdbacef41a361bf59e6d1c39bd00d0e256fd63c4e234416496c3c3aae648f90660982ffc989e8bf6535c8c9f54dbf7c9"}, {@none, 0x8, 0x2, "be9062", 0xffff, 0x20, "905437d3d595cef0aaddc24c198d21da2e559e8ceea935ca0cc2bb3c50d251cede2879f4742da415d31e433ccd749d97ac9d5511aed33818670bf375619b445aba4d30d433419a8de40baab45d0bb19131cbcd36c9d89768ab553c523911d65dfb5384c7e31a605fedddda1fbd9ca0e429ef1e6bc5fd1f1264310286db8cab41b9f3eeace60adb6ef3166026fbf121cbe230add184291c6c62de1108a549398b453e6de250f37dd13eaf960af6943781ab29d10ab1f4155a69d7164cec6ca60b8a2d65c59bcac3c9a267876ec6b36fdce05a9cf05aac99b38f9dec79e52cbd80a6194cb7289c9422c2b2f6a5e400069b"}, {@any, 0x3f, 0x2, "c8cb31", 0x5, 0x8, "142becfa424a96392837d6de6a98beb9b0af98d964bb865618d8885489e2de073e6e492647c2896e79806eff15f892cf0b6f425ab8f842b950bb7ef335a9dda721da9a36eb0879fe1a0f56930d4ba2e5cc7ad29684b8e7a313f1845e7c73fe11d38fc793756c955b909781f7f2e876712fde22b2d6de50bf65e5454e288a9e199afec2080cd471282980ffba68b76ea3111a5ab279c3b71e748bd7516c3dc649fee99b885cbfdba7ac552dce4941714b924f21324284b53ca5413568a035234032f4d438df9fbdaa17752980ead81e1c880fe3daf28af5e5b8c34f560bca94f75e318a346a88d82a12f3c0e9d279b8ef"}]}}}, 0x2fe) 17:19:41 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3", 0xae, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:19:41 executing program 7: sched_getaffinity(0x0, 0x0, 0x0) 17:19:41 executing program 6: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000240)) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xff, 0x5, 0x40, 0x0, 0x0, 0x905, 0x90000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000180), 0x1}, 0x10080, 0x3, 0x3, 0x6, 0x0, 0x1, 0x6, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0x2fb}, {0x3, [{@none, 0x9, 0x8, "c30c5b", 0xe, 0x2, "db30ba492ae7cebc05283ff7316f6f210553ec196d4a18ecf5d01dc1bf997ef13579191093ad7c2097050b9b51724181ceacef3154a0e7263bc3589c93be7217c652e0837c4276244b75a00d7d152938e796920a4def61bae4095fb54159a062fd16816dc45c62affc0a91db419bbaeab0975ae432f34d200d365d0df346882e2c547258e57cab65b7477097aec25c74fd123058f55e16b6a37b2da87d7804ccb4c46e8c72ea562bc610c7c24a1d06577f0b55e43d6f6df8af0fd111dff06245bdbacef41a361bf59e6d1c39bd00d0e256fd63c4e234416496c3c3aae648f90660982ffc989e8bf6535c8c9f54dbf7c9"}, {@none, 0x8, 0x2, "be9062", 0xffff, 0x20, "905437d3d595cef0aaddc24c198d21da2e559e8ceea935ca0cc2bb3c50d251cede2879f4742da415d31e433ccd749d97ac9d5511aed33818670bf375619b445aba4d30d433419a8de40baab45d0bb19131cbcd36c9d89768ab553c523911d65dfb5384c7e31a605fedddda1fbd9ca0e429ef1e6bc5fd1f1264310286db8cab41b9f3eeace60adb6ef3166026fbf121cbe230add184291c6c62de1108a549398b453e6de250f37dd13eaf960af6943781ab29d10ab1f4155a69d7164cec6ca60b8a2d65c59bcac3c9a267876ec6b36fdce05a9cf05aac99b38f9dec79e52cbd80a6194cb7289c9422c2b2f6a5e400069b"}, {@any, 0x3f, 0x2, "c8cb31", 0x5, 0x8, "142becfa424a96392837d6de6a98beb9b0af98d964bb865618d8885489e2de073e6e492647c2896e79806eff15f892cf0b6f425ab8f842b950bb7ef335a9dda721da9a36eb0879fe1a0f56930d4ba2e5cc7ad29684b8e7a313f1845e7c73fe11d38fc793756c955b909781f7f2e876712fde22b2d6de50bf65e5454e288a9e199afec2080cd471282980ffba68b76ea3111a5ab279c3b71e748bd7516c3dc649fee99b885cbfdba7ac552dce4941714b924f21324284b53ca5413568a035234032f4d438df9fbdaa17752980ead81e1c880fe3daf28af5e5b8c34f560bca94f75e318a346a88d82a12f3c0e9d279b8ef"}]}}}, 0x2fe) 17:19:41 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x7000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) [ 2917.029508] Bluetooth: hci7: unexpected event 0x2f length: 763 > 260 [ 2917.094062] Bluetooth: hci1: unexpected event for opcode 0x043d 17:19:41 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89", 0x81, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:19:41 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:19:41 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3", 0xae, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) [ 2917.124876] Bluetooth: hci7: unexpected event 0x2f length: 763 > 260 [ 2917.151129] SELinux: security_context_str_to_sid (root) failed with errno=-22 17:19:41 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:19:41 executing program 6: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000240)) syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0x2fb}, {0x3, [{@none, 0x9, 0x8, "c30c5b", 0xe, 0x2, "db30ba492ae7cebc05283ff7316f6f210553ec196d4a18ecf5d01dc1bf997ef13579191093ad7c2097050b9b51724181ceacef3154a0e7263bc3589c93be7217c652e0837c4276244b75a00d7d152938e796920a4def61bae4095fb54159a062fd16816dc45c62affc0a91db419bbaeab0975ae432f34d200d365d0df346882e2c547258e57cab65b7477097aec25c74fd123058f55e16b6a37b2da87d7804ccb4c46e8c72ea562bc610c7c24a1d06577f0b55e43d6f6df8af0fd111dff06245bdbacef41a361bf59e6d1c39bd00d0e256fd63c4e234416496c3c3aae648f90660982ffc989e8bf6535c8c9f54dbf7c9"}, {@none, 0x8, 0x2, "be9062", 0xffff, 0x20, "905437d3d595cef0aaddc24c198d21da2e559e8ceea935ca0cc2bb3c50d251cede2879f4742da415d31e433ccd749d97ac9d5511aed33818670bf375619b445aba4d30d433419a8de40baab45d0bb19131cbcd36c9d89768ab553c523911d65dfb5384c7e31a605fedddda1fbd9ca0e429ef1e6bc5fd1f1264310286db8cab41b9f3eeace60adb6ef3166026fbf121cbe230add184291c6c62de1108a549398b453e6de250f37dd13eaf960af6943781ab29d10ab1f4155a69d7164cec6ca60b8a2d65c59bcac3c9a267876ec6b36fdce05a9cf05aac99b38f9dec79e52cbd80a6194cb7289c9422c2b2f6a5e400069b"}, {@any, 0x3f, 0x2, "c8cb31", 0x5, 0x8, "142becfa424a96392837d6de6a98beb9b0af98d964bb865618d8885489e2de073e6e492647c2896e79806eff15f892cf0b6f425ab8f842b950bb7ef335a9dda721da9a36eb0879fe1a0f56930d4ba2e5cc7ad29684b8e7a313f1845e7c73fe11d38fc793756c955b909781f7f2e876712fde22b2d6de50bf65e5454e288a9e199afec2080cd471282980ffba68b76ea3111a5ab279c3b71e748bd7516c3dc649fee99b885cbfdba7ac552dce4941714b924f21324284b53ca5413568a035234032f4d438df9fbdaa17752980ead81e1c880fe3daf28af5e5b8c34f560bca94f75e318a346a88d82a12f3c0e9d279b8ef"}]}}}, 0x2fe) [ 2917.240814] Bluetooth: hci1: unexpected event for opcode 0x043d 17:19:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x10000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) 17:19:53 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioprio_get$pid(0x1, r0) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) pidfd_open(r0, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x0, 0x0, 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_gt}]}) 17:19:53 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:19:53 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be0659", 0xcb, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:19:53 executing program 6: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000240)) syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0x2fb}, {0x3, [{@none, 0x9, 0x8, "c30c5b", 0xe, 0x2, "db30ba492ae7cebc05283ff7316f6f210553ec196d4a18ecf5d01dc1bf997ef13579191093ad7c2097050b9b51724181ceacef3154a0e7263bc3589c93be7217c652e0837c4276244b75a00d7d152938e796920a4def61bae4095fb54159a062fd16816dc45c62affc0a91db419bbaeab0975ae432f34d200d365d0df346882e2c547258e57cab65b7477097aec25c74fd123058f55e16b6a37b2da87d7804ccb4c46e8c72ea562bc610c7c24a1d06577f0b55e43d6f6df8af0fd111dff06245bdbacef41a361bf59e6d1c39bd00d0e256fd63c4e234416496c3c3aae648f90660982ffc989e8bf6535c8c9f54dbf7c9"}, {@none, 0x8, 0x2, "be9062", 0xffff, 0x20, "905437d3d595cef0aaddc24c198d21da2e559e8ceea935ca0cc2bb3c50d251cede2879f4742da415d31e433ccd749d97ac9d5511aed33818670bf375619b445aba4d30d433419a8de40baab45d0bb19131cbcd36c9d89768ab553c523911d65dfb5384c7e31a605fedddda1fbd9ca0e429ef1e6bc5fd1f1264310286db8cab41b9f3eeace60adb6ef3166026fbf121cbe230add184291c6c62de1108a549398b453e6de250f37dd13eaf960af6943781ab29d10ab1f4155a69d7164cec6ca60b8a2d65c59bcac3c9a267876ec6b36fdce05a9cf05aac99b38f9dec79e52cbd80a6194cb7289c9422c2b2f6a5e400069b"}, {@any, 0x3f, 0x2, "c8cb31", 0x5, 0x8, "142becfa424a96392837d6de6a98beb9b0af98d964bb865618d8885489e2de073e6e492647c2896e79806eff15f892cf0b6f425ab8f842b950bb7ef335a9dda721da9a36eb0879fe1a0f56930d4ba2e5cc7ad29684b8e7a313f1845e7c73fe11d38fc793756c955b909781f7f2e876712fde22b2d6de50bf65e5454e288a9e199afec2080cd471282980ffba68b76ea3111a5ab279c3b71e748bd7516c3dc649fee99b885cbfdba7ac552dce4941714b924f21324284b53ca5413568a035234032f4d438df9fbdaa17752980ead81e1c880fe3daf28af5e5b8c34f560bca94f75e318a346a88d82a12f3c0e9d279b8ef"}]}}}, 0x2fe) 17:19:53 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89", 0x81, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:19:53 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x0, 0x0, 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_gt}]}) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = getpid() ioprio_get$pid(0x1, r4) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r4, 0x8, r3, 0x9) r5 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0xd2447673424f557f, 0x0) kcmp$KCMP_EPOLL_TFD(r4, r2, 0x7, r0, &(0x7f0000000200)={r5, r1, 0x3ff}) [ 2917.254206] Bluetooth: hci7: unexpected event 0x2f length: 763 > 260 [ 2929.076171] loop1: detected capacity change from 0 to 40 17:19:53 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) [ 2929.097225] SELinux: security_context_str_to_sid (root) failed with errno=-22 [ 2929.133394] Bluetooth: hci1: unexpected event for opcode 0x043d 17:19:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x20000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) 17:19:53 executing program 5: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:19:53 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98", 0x96, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:19:53 executing program 6: syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0x2fb}, {0x3, [{@none, 0x9, 0x8, "c30c5b", 0xe, 0x2, "db30ba492ae7cebc05283ff7316f6f210553ec196d4a18ecf5d01dc1bf997ef13579191093ad7c2097050b9b51724181ceacef3154a0e7263bc3589c93be7217c652e0837c4276244b75a00d7d152938e796920a4def61bae4095fb54159a062fd16816dc45c62affc0a91db419bbaeab0975ae432f34d200d365d0df346882e2c547258e57cab65b7477097aec25c74fd123058f55e16b6a37b2da87d7804ccb4c46e8c72ea562bc610c7c24a1d06577f0b55e43d6f6df8af0fd111dff06245bdbacef41a361bf59e6d1c39bd00d0e256fd63c4e234416496c3c3aae648f90660982ffc989e8bf6535c8c9f54dbf7c9"}, {@none, 0x8, 0x2, "be9062", 0xffff, 0x20, "905437d3d595cef0aaddc24c198d21da2e559e8ceea935ca0cc2bb3c50d251cede2879f4742da415d31e433ccd749d97ac9d5511aed33818670bf375619b445aba4d30d433419a8de40baab45d0bb19131cbcd36c9d89768ab553c523911d65dfb5384c7e31a605fedddda1fbd9ca0e429ef1e6bc5fd1f1264310286db8cab41b9f3eeace60adb6ef3166026fbf121cbe230add184291c6c62de1108a549398b453e6de250f37dd13eaf960af6943781ab29d10ab1f4155a69d7164cec6ca60b8a2d65c59bcac3c9a267876ec6b36fdce05a9cf05aac99b38f9dec79e52cbd80a6194cb7289c9422c2b2f6a5e400069b"}, {@any, 0x3f, 0x2, "c8cb31", 0x5, 0x8, "142becfa424a96392837d6de6a98beb9b0af98d964bb865618d8885489e2de073e6e492647c2896e79806eff15f892cf0b6f425ab8f842b950bb7ef335a9dda721da9a36eb0879fe1a0f56930d4ba2e5cc7ad29684b8e7a313f1845e7c73fe11d38fc793756c955b909781f7f2e876712fde22b2d6de50bf65e5454e288a9e199afec2080cd471282980ffba68b76ea3111a5ab279c3b71e748bd7516c3dc649fee99b885cbfdba7ac552dce4941714b924f21324284b53ca5413568a035234032f4d438df9fbdaa17752980ead81e1c880fe3daf28af5e5b8c34f560bca94f75e318a346a88d82a12f3c0e9d279b8ef"}]}}}, 0x2fe) [ 2929.140541] Bluetooth: hci7: unexpected event 0x2f length: 763 > 260 [ 2929.231747] SELinux: security_context_str_to_sid (root) failed with errno=-22 17:19:53 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) [ 2929.259481] loop1: detected capacity change from 0 to 40 [ 2929.276531] Bluetooth: hci4: unexpected event for opcode 0x043d 17:19:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x20100000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) 17:19:53 executing program 5: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) [ 2929.329932] Bluetooth: hci1: unexpected event for opcode 0x043d 17:19:53 executing program 7: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89", 0x81, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) [ 2929.337166] Bluetooth: hci7: unexpected event 0x2f length: 763 > 260 [ 2929.423251] Bluetooth: hci4: unexpected event for opcode 0x043d [ 2929.457270] Bluetooth: hci3: unexpected event for opcode 0x043d 17:20:04 executing program 5: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:20:04 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98", 0x96, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:20:04 executing program 6: syz_emit_vhci(0x0, 0x0) 17:20:04 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:20:04 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x48000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) 17:20:04 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:20:04 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be0659", 0xcb, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:20:04 executing program 7: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89", 0x81, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) [ 2940.444074] Bluetooth: hci3: unexpected event for opcode 0x043d [ 2940.458167] SELinux: security_context_str_to_sid (root) failed with errno=-22 17:20:04 executing program 7: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89", 0x81, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:20:04 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x4c000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) [ 2940.519147] Bluetooth: hci4: unexpected event for opcode 0x043d 17:20:04 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be0659", 0xcb, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:20:04 executing program 6: syz_emit_vhci(0x0, 0x0) 17:20:04 executing program 5: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98", 0x96, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) [ 2940.575687] Bluetooth: hci3: unexpected event for opcode 0x043d 17:20:04 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ioprio_get$pid(0x1, r1) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x40100, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x7f, 0x3, 0x2, 0x7, 0x0, 0x8000, 0x800, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x80000001, 0x4, @perf_config_ext={0x1, 0x3}, 0x10400, 0x0, 0xc000, 0x3, 0x10001, 0x7, 0x6, 0x0, 0x2, 0x0, 0xf1}, 0xffffffffffffffff, 0x4, r2, 0x5) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x0, 0x0, 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_gt}]}) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xff, 0x4, 0x81, 0x7f, 0x0, 0x936c, 0x80080, 0x8, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x800, 0x4, @perf_config_ext={0xdd08}, 0x8003, 0x4, 0xf2, 0x3, 0x7, 0xffffffc0, 0x4, 0x0, 0x8, 0x0, 0xd8a}, r1, 0xe, r0, 0xb) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {0x4}}, './file0\x00'}) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x7f, 0x8, 0x1, 0x4, 0x0, 0x80000000000000, 0x0, 0xe, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x5, 0x2}, 0x21, 0xfffffffffffffffa, 0x0, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x35fddeaa, 0x0, 0x6777f3cd}, r1, 0x10, r3, 0x1) 17:20:04 executing program 6: syz_emit_vhci(0x0, 0x0) [ 2940.627085] Bluetooth: hci1: unexpected event for opcode 0x043d 17:20:04 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98", 0x96, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) [ 2940.683739] SELinux: security_context_str_to_sid (root) failed with errno=-22 [ 2940.741791] Bluetooth: hci1: unexpected event for opcode 0x043d [ 2940.742912] Bluetooth: hci4: unexpected event for opcode 0x043d 17:20:16 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:20:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a", 0xd9, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:20:16 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:20:16 executing program 6: syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0x1fd}, {0x2, [{@none, 0x9, 0x8, "c30c5b", 0xe, 0x2, "db30ba492ae7cebc05283ff7316f6f210553ec196d4a18ecf5d01dc1bf997ef13579191093ad7c2097050b9b51724181ceacef3154a0e7263bc3589c93be7217c652e0837c4276244b75a00d7d152938e796920a4def61bae4095fb54159a062fd16816dc45c62affc0a91db419bbaeab0975ae432f34d200d365d0df346882e2c547258e57cab65b7477097aec25c74fd123058f55e16b6a37b2da87d7804ccb4c46e8c72ea562bc610c7c24a1d06577f0b55e43d6f6df8af0fd111dff06245bdbacef41a361bf59e6d1c39bd00d0e256fd63c4e234416496c3c3aae648f90660982ffc989e8bf6535c8c9f54dbf7c9"}, {@none, 0x8, 0x2, "be9062", 0xffff, 0x20, "905437d3d595cef0aaddc24c198d21da2e559e8ceea935ca0cc2bb3c50d251cede2879f4742da415d31e433ccd749d97ac9d5511aed33818670bf375619b445aba4d30d433419a8de40baab45d0bb19131cbcd36c9d89768ab553c523911d65dfb5384c7e31a605fedddda1fbd9ca0e429ef1e6bc5fd1f1264310286db8cab41b9f3eeace60adb6ef3166026fbf121cbe230add184291c6c62de1108a549398b453e6de250f37dd13eaf960af6943781ab29d10ab1f4155a69d7164cec6ca60b8a2d65c59bcac3c9a267876ec6b36fdce05a9cf05aac99b38f9dec79e52cbd80a6194cb7289c9422c2b2f6a5e400069b"}]}}}, 0x200) 17:20:16 executing program 7: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x0) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:20:16 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7", 0xa1, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:20:16 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x0, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:20:16 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x68000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) [ 2952.793280] Bluetooth: hci3: unexpected event for opcode 0x043d [ 2952.801585] SELinux: security_context_str_to_sid (root) failed with errno=-22 17:20:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a", 0xd9, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:20:16 executing program 7: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x0) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:20:16 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x6c000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) 17:20:16 executing program 6: syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0xff}, {0x1, [{@none, 0x9, 0x8, "c30c5b", 0xe, 0x2, "db30ba492ae7cebc05283ff7316f6f210553ec196d4a18ecf5d01dc1bf997ef13579191093ad7c2097050b9b51724181ceacef3154a0e7263bc3589c93be7217c652e0837c4276244b75a00d7d152938e796920a4def61bae4095fb54159a062fd16816dc45c62affc0a91db419bbaeab0975ae432f34d200d365d0df346882e2c547258e57cab65b7477097aec25c74fd123058f55e16b6a37b2da87d7804ccb4c46e8c72ea562bc610c7c24a1d06577f0b55e43d6f6df8af0fd111dff06245bdbacef41a361bf59e6d1c39bd00d0e256fd63c4e234416496c3c3aae648f90660982ffc989e8bf6535c8c9f54dbf7c9"}]}}}, 0x102) [ 2952.808779] Bluetooth: hci7: unexpected event 0x2f length: 509 > 260 [ 2952.887159] Bluetooth: hci1: unexpected event for opcode 0x043d 17:20:17 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7", 0xa1, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) [ 2952.940282] SELinux: security_context_str_to_sid (root) failed with errno=-22 17:20:17 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) [ 2952.966236] Bluetooth: hci3: unexpected event for opcode 0x043d [ 2953.027953] loop1: detected capacity change from 0 to 40 [ 2953.112459] Bluetooth: hci1: unexpected event for opcode 0x043d 17:20:30 executing program 6: syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0x1}}}, 0x4) 17:20:30 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7", 0xa1, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:20:30 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x71010000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) [ 2966.075175] SELinux: security_context_str_to_sid (root) failed with errno=-22 17:20:30 executing program 7: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x0) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:20:30 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a", 0xd9, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:20:30 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x0, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:20:30 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:20:30 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) [ 2966.108347] SELinux: security_context_str_to_sid (root) failed with errno=-22 17:20:30 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x74000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) 17:20:30 executing program 6: syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0x1}}}, 0x4) [ 2966.180762] Bluetooth: hci3: unexpected event for opcode 0x043d [ 2966.197691] Bluetooth: hci1: unexpected event for opcode 0x043d 17:20:30 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) [ 2966.218661] SELinux: security_context_str_to_sid (root) failed with errno=-22 17:20:30 executing program 7: syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0x1}}}, 0x4) 17:20:30 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d88", 0xa6, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:20:30 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x7a000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) 17:20:30 executing program 6: syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0x1}}}, 0x4) [ 2966.310056] loop0: detected capacity change from 0 to 74 [ 2966.349231] loop1: detected capacity change from 0 to 40 [ 2966.351777] SELinux: security_context_str_to_sid (root) failed with errno=-22 [ 2966.357396] SELinux: security_context_str_to_sid (root) failed with errno=-22 17:20:30 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:20:30 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:20:30 executing program 6: syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0xff}, {0x1, [{@none, 0x0, 0x8, "c30c5b", 0xe, 0x2, "db30ba492ae7cebc05283ff7316f6f210553ec196d4a18ecf5d01dc1bf997ef13579191093ad7c2097050b9b51724181ceacef3154a0e7263bc3589c93be7217c652e0837c4276244b75a00d7d152938e796920a4def61bae4095fb54159a062fd16816dc45c62affc0a91db419bbaeab0975ae432f34d200d365d0df346882e2c547258e57cab65b7477097aec25c74fd123058f55e16b6a37b2da87d7804ccb4c46e8c72ea562bc610c7c24a1d06577f0b55e43d6f6df8af0fd111dff06245bdbacef41a361bf59e6d1c39bd00d0e256fd63c4e234416496c3c3aae648f90660982ffc989e8bf6535c8c9f54dbf7c9"}]}}}, 0x102) 17:20:30 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206a", 0xe0, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:20:30 executing program 5: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7", 0xa1, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:20:30 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) 17:20:30 executing program 7: syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0x1}}}, 0x4) [ 2966.488516] Bluetooth: hci4: unexpected event for opcode 0x043d [ 2966.504672] loop0: detected capacity change from 0 to 74 [ 2966.512106] Bluetooth: hci1: unexpected event for opcode 0x043d 17:20:30 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0xc0ed0000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) 17:20:30 executing program 6: syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0xff}, {0x1, [{@none, 0x0, 0x0, "c30c5b", 0xe, 0x2, "db30ba492ae7cebc05283ff7316f6f210553ec196d4a18ecf5d01dc1bf997ef13579191093ad7c2097050b9b51724181ceacef3154a0e7263bc3589c93be7217c652e0837c4276244b75a00d7d152938e796920a4def61bae4095fb54159a062fd16816dc45c62affc0a91db419bbaeab0975ae432f34d200d365d0df346882e2c547258e57cab65b7477097aec25c74fd123058f55e16b6a37b2da87d7804ccb4c46e8c72ea562bc610c7c24a1d06577f0b55e43d6f6df8af0fd111dff06245bdbacef41a361bf59e6d1c39bd00d0e256fd63c4e234416496c3c3aae648f90660982ffc989e8bf6535c8c9f54dbf7c9"}]}}}, 0x102) 17:20:30 executing program 7: syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0x1}}}, 0x4) [ 2966.586296] SELinux: security_context_str_to_sid (root) failed with errno=-22 17:20:42 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206a", 0xe0, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:20:42 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d88", 0xa6, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:20:42 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0xf0000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) 17:20:42 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:20:42 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:20:42 executing program 5: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7", 0xa1, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:20:42 executing program 7: 17:20:42 executing program 6: syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0xff}, {0x1, [{@none, 0x0, 0x0, "c30c5b", 0x0, 0x2, "db30ba492ae7cebc05283ff7316f6f210553ec196d4a18ecf5d01dc1bf997ef13579191093ad7c2097050b9b51724181ceacef3154a0e7263bc3589c93be7217c652e0837c4276244b75a00d7d152938e796920a4def61bae4095fb54159a062fd16816dc45c62affc0a91db419bbaeab0975ae432f34d200d365d0df346882e2c547258e57cab65b7477097aec25c74fd123058f55e16b6a37b2da87d7804ccb4c46e8c72ea562bc610c7c24a1d06577f0b55e43d6f6df8af0fd111dff06245bdbacef41a361bf59e6d1c39bd00d0e256fd63c4e234416496c3c3aae648f90660982ffc989e8bf6535c8c9f54dbf7c9"}]}}}, 0x102) 17:20:42 executing program 6: syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0xff}, {0x1, [{@none, 0x0, 0x0, "c30c5b", 0x0, 0x0, "db30ba492ae7cebc05283ff7316f6f210553ec196d4a18ecf5d01dc1bf997ef13579191093ad7c2097050b9b51724181ceacef3154a0e7263bc3589c93be7217c652e0837c4276244b75a00d7d152938e796920a4def61bae4095fb54159a062fd16816dc45c62affc0a91db419bbaeab0975ae432f34d200d365d0df346882e2c547258e57cab65b7477097aec25c74fd123058f55e16b6a37b2da87d7804ccb4c46e8c72ea562bc610c7c24a1d06577f0b55e43d6f6df8af0fd111dff06245bdbacef41a361bf59e6d1c39bd00d0e256fd63c4e234416496c3c3aae648f90660982ffc989e8bf6535c8c9f54dbf7c9"}]}}}, 0x102) 17:20:42 executing program 7: [ 2978.824923] Bluetooth: hci4: unexpected event for opcode 0x043d [ 2978.826011] Bluetooth: hci1: unexpected event for opcode 0x043d 17:20:55 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) 17:20:55 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d88", 0xa6, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:20:55 executing program 7: 17:20:55 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206a", 0xe0, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:20:55 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:20:55 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:20:55 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ioprio_get$pid(0x1, r1) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x8, 0x0, 0x4, 0xd, 0x0, 0x5, 0x2008, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0x5, 0x20}, 0x220, 0x0, 0x3da0, 0x5, 0x6, 0x100, 0x2, 0x0, 0xcca5}, r1, 0x3, r0, 0x1) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x0, 0x0, 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@iocharset={'iocharset', 0x3d, 'cp860'}}], [{@uid_gt}]}) 17:20:55 executing program 5: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7", 0xa1, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:20:55 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0xfa0c0000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) [ 2991.292669] Bluetooth: hci4: unexpected event for opcode 0x043d 17:20:55 executing program 7: syz_emit_vhci(0x0, 0x0) 17:20:55 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0xffffe000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) [ 2991.316741] Bluetooth: hci1: unexpected event for opcode 0x043d 17:20:55 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x0, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:20:55 executing program 5: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x0) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:20:55 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:20:55 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961a", 0xa9, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:20:55 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) [ 2991.457561] Bluetooth: hci1: unexpected event for opcode 0x043d [ 2991.483107] Bluetooth: hci4: unexpected event for opcode 0x043d 17:21:06 executing program 7: syz_emit_vhci(0x0, 0x0) 17:21:06 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:21:06 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961a", 0xa9, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:21:06 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b99", 0xe4, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:21:06 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff8c, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) 17:21:06 executing program 5: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961a", 0xa9, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:21:06 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0xfe, 0x3, 0x9, 0x7, 0x0, 0x3c3b, 0x80, 0xa, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xf66, 0x4, @perf_config_ext={0x29, 0x7fffffff}, 0x1, 0x8, 0x565c, 0x7, 0x8, 0x31b, 0x6, 0x0, 0x1, 0x0, 0x4}, r1, 0x7, 0xffffffffffffffff, 0xf) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) r3 = epoll_create(0x7318000) close_range(r3, r0, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x0, 0x0, 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_gt}]}) syz_emit_vhci(&(0x7f0000000180)=@HCI_ACLDATA_PKT={0x2, {0x0, 0x0, 0x0, 0xa}, @l2cap_cid_le_signaling={{0x6}, @l2cap_conn_param_update_rsp={{0x13, 0x1, 0x2}, {0x4}}}}, 0xf) 17:21:06 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:21:06 executing program 7: syz_emit_vhci(0x0, 0x0) [ 3002.881652] Bluetooth: hci7: ACL packet for unknown connection handle 0 [ 3002.890351] Bluetooth: hci1: unexpected event for opcode 0x043d 17:21:07 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b99", 0xe4, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) [ 3002.917143] Bluetooth: hci4: unexpected event for opcode 0x043d 17:21:07 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff6, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) 17:21:07 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:21:07 executing program 7: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x0, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:21:07 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0xcd}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x57, 0x1f, 0x7f, 0x7, 0x0, 0x1000, 0x22081, 0x9, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, @perf_bp={&(0x7f0000000040)}, 0x100, 0x401, 0xd0d3, 0x8, 0x401, 0x3, 0x100, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x7, r1, 0x9) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, r3, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f0000000640)={0x0, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000000)=0x9) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000140)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000100)={[0x400]}, &(0x7f0000000280), &(0x7f0000000180)={0x0, 0x3938700}, 0x8) r4 = syz_open_dev$vcsa(&(0x7f0000000680), 0x1, 0x400) move_mount(0xffffffffffffffff, &(0x7f0000000640)='./file1\x00', r4, &(0x7f00000006c0)='./file1\x00', 0x0) fgetxattr(r0, &(0x7f0000000240)=ANY=[@ANYBLOB='osx\x00'], &(0x7f0000000280)=""/102, 0x66) 17:21:07 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961a", 0xa9, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:21:07 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) [ 3003.010688] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.011084] blk_print_req_error: 524 callbacks suppressed [ 3003.011094] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3003.012063] buffer_io_error: 574 callbacks suppressed [ 3003.012071] Buffer I/O error on dev sr0, logical block 0, async page read [ 3003.013139] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.013500] I/O error, dev sr0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3003.014062] Buffer I/O error on dev sr0, logical block 1, async page read [ 3003.014994] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.015362] I/O error, dev sr0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3003.015941] Buffer I/O error on dev sr0, logical block 2, async page read [ 3003.016663] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.017027] I/O error, dev sr0, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3003.017575] Buffer I/O error on dev sr0, logical block 3, async page read [ 3003.019346] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.019730] I/O error, dev sr0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3003.020287] Buffer I/O error on dev sr0, logical block 4, async page read [ 3003.021002] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.021363] I/O error, dev sr0, sector 5 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3003.021928] Buffer I/O error on dev sr0, logical block 5, async page read [ 3003.022893] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.023263] I/O error, dev sr0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3003.023821] Buffer I/O error on dev sr0, logical block 6, async page read [ 3003.024498] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.024883] I/O error, dev sr0, sector 7 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3003.025442] Buffer I/O error on dev sr0, logical block 7, async page read [ 3003.026718] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.027073] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3003.027748] Buffer I/O error on dev sr0, logical block 0, async page read [ 3003.030272] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.030688] I/O error, dev sr0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3003.031294] Buffer I/O error on dev sr0, logical block 1, async page read [ 3003.032028] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.032638] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.033283] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.034373] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.034973] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.035578] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.036418] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.037442] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.038148] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.038827] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.040635] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.041223] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.041917] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.042511] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.043314] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.044190] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.044813] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.045417] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.046027] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.046930] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.047532] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.048208] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.056077] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.057466] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.059151] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.060059] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.060738] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.061380] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.062352] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.062976] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.101081] Bluetooth: hci1: unexpected event for opcode 0x043d 17:21:07 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad7", 0xaa, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) [ 3003.151521] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.180506] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.187149] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.192469] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.196200] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.200644] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.206219] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.217879] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.220937] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.223360] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.225135] Bluetooth: hci3: unexpected event for opcode 0x043d [ 3003.225877] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.226419] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.227704] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.228293] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.228921] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.229566] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.230383] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.237946] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.238506] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.239813] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.240400] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.246228] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.246817] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.261397] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.265337] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.269214] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.271202] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.278578] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.280339] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.283331] Bluetooth: hci1: unexpected event for opcode 0x043d [ 3003.283553] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.289161] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.290442] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.294190] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.297205] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.299166] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.303208] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.304040] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.304630] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.305207] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.306127] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.306984] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.307555] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.308201] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.308836] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.311153] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.311962] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.312423] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.313005] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.314239] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.317857] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.318428] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.319199] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.320508] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.322074] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.323535] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.325162] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.328188] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.329527] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.331464] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.333066] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.335265] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.337167] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.338514] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.340099] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.341555] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.343086] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.344410] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.346070] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.347384] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.349117] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.350430] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.352089] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.353514] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.355114] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.356395] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.360418] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.362214] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.363578] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.365155] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.366424] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.368413] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.370085] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.371403] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.373153] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.374476] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.376129] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.377439] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.379133] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.380506] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.382118] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.383389] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.384704] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.386076] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.387330] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.388695] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.390078] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.391424] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.393096] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.394343] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.395656] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.397104] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.398356] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.399673] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.401091] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.402448] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.404086] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.405359] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.406693] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.408099] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.409374] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.410703] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.412106] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.413479] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.415092] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.416357] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.418029] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.419292] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.420569] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.422065] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.423333] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.425155] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.426418] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.428086] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.429364] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.431076] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.431908] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.432767] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.433987] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.435186] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.435833] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.436436] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.437230] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.437866] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.438487] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.439307] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.440142] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.441095] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.441922] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.442472] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.443103] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.443939] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.444446] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.445076] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.446062] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.446725] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.447378] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.448021] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.448644] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.449221] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.449875] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.450476] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.456017] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.456678] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.457280] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.458540] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.462479] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.464281] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.465866] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.467184] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.468655] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.470453] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.472461] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.475131] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.476478] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.478458] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.481064] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.482352] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.484351] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.487112] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.488419] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.490179] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.491696] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.493360] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.495476] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.497075] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.498516] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.500488] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.502480] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.504479] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.506451] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.508498] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.510454] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.512074] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.513477] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.515142] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.517120] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.518411] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.520493] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.522136] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.523526] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.525465] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.527220] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.528544] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.530500] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.532452] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.534446] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.536495] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.538059] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.539376] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.541692] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.543075] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.544407] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.546438] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.548487] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.550464] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.552455] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.554056] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.555461] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.557446] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.559461] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.565223] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.566547] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.569040] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.570341] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.571686] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.573536] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.575064] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.576395] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.578468] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.580480] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.583031] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.584388] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.586466] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.588155] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.588988] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.589822] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.591053] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.592235] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.592843] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.593404] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.594816] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.595375] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.596100] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.596730] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.597436] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.598069] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.598710] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.599288] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.599955] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.600515] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.601103] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.601889] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.602457] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.603058] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.608590] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.610058] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.611389] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.613482] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.615070] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.616385] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.620130] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.620858] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.621427] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.622139] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.622741] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.623331] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.624028] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.624627] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.625394] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.626038] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.626628] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.627193] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.627981] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.628568] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.629160] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.629950] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.630476] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.631082] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.631873] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.632455] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.633036] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.633640] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.634191] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.636198] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.637639] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.639186] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.640524] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.642434] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.644449] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.646052] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.647377] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.649109] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.650562] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.652255] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.655043] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.656380] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.658172] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.659533] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.661225] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.662573] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.667069] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.668363] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.670429] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.673337] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.674694] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.676629] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.679033] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.680361] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.682239] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.683635] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.685220] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.687491] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.689068] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.692108] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.693427] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.695170] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.696680] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.699221] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.700559] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.702472] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.704468] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.707188] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.708523] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.710166] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.711683] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.713205] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.715485] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.717184] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.718525] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.720245] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.723066] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.724381] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.726266] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.727657] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.729231] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.731198] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.732548] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.734168] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.737082] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.738388] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.740275] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.741659] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.743163] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.744985] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.746094] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.746669] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.747219] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.747908] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.748628] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.749196] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.749961] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.750510] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.751109] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.751979] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.752522] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.753119] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.753981] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.754547] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.755120] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.755801] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.759068] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.760415] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.762047] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.763354] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.765185] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.770367] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.772056] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.774392] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.776198] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.778505] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.781078] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.782405] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.784271] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.785654] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.787196] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.789129] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.790445] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.792293] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.793679] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.795163] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.797214] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.798524] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.801086] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.802408] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.804196] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.805540] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.807174] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.809470] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.812132] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.813465] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.815414] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.824089] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.826554] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.830247] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.831635] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.833412] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.837231] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.838534] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.841365] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.843797] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.846125] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.849381] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.851725] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.854136] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.858200] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.861059] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.862334] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.865190] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.866524] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.868277] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.883314] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 3003.885684] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 17:21:19 executing program 5: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x0, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:21:19 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad7", 0xaa, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:21:19 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:21:19 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:21:19 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0xedc000000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) 17:21:19 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:21:19 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b99", 0xe4, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:21:19 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) [ 3015.653268] Bluetooth: hci1: unexpected event for opcode 0x043d 17:21:19 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad7", 0xaa, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) [ 3015.708326] Bluetooth: hci4: unexpected event for opcode 0x043d 17:21:19 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:21:19 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x8000000000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) 17:21:19 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x0, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:21:19 executing program 7: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x0, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:21:20 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130", 0xe6, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) [ 3015.903281] Bluetooth: hci1: unexpected event for opcode 0x043d 17:21:20 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x0, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) [ 3015.967959] Bluetooth: hci3: unexpected event for opcode 0x043d 17:21:32 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, 0x0, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:21:32 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130", 0xe6, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:21:32 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x0, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:21:32 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0xe0ffff00000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) 17:21:32 executing program 6: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x0, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:21:32 executing program 7: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x0, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:21:32 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) [ 3028.541181] Bluetooth: hci3: unexpected event for opcode 0x043d [ 3028.542338] Bluetooth: hci7: unexpected event for opcode 0x043d perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:21:32 executing program 6: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x0, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:21:32 executing program 7: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x0, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:21:32 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:21:32 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x100000000000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) [ 3028.668565] Bluetooth: hci3: unexpected event for opcode 0x043d [ 3028.671344] loop0: detected capacity change from 0 to 74 [ 3028.689084] loop1: detected capacity change from 0 to 256 [ 3028.692897] Bluetooth: hci7: unexpected event for opcode 0x043d [ 3028.714849] SELinux: security_context_str_to_sid (root) failed with errno=-22 [ 3028.721376] Bluetooth: hci1: unexpected event for opcode 0x043d 17:21:44 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x2, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioprio_get$pid(0x1, r0) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_user_passkey_req={{0x34, 0x6}}}, 0x9) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x0, 0x0, 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_gt}]}) 17:21:44 executing program 6: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x0, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:21:44 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x0, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:21:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x200000000000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) 17:21:44 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130", 0xe6, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:21:44 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:21:44 executing program 5: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:21:44 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) [ 3040.108484] loop1: detected capacity change from 0 to 40 17:21:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x300000000000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) 17:21:44 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x2, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioprio_get$pid(0x1, r0) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_user_passkey_req={{0x34, 0x6}}}, 0x9) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x0, 0x0, 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_gt}]}) [ 3040.186425] Bluetooth: hci1: unexpected event for opcode 0x043d [ 3040.207158] Bluetooth: hci4: unexpected event for opcode 0x043d [ 3040.247176] Bluetooth: hci7: unexpected event for opcode 0x043d 17:21:44 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:21:44 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x0, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:21:44 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:21:44 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:21:44 executing program 6: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x0, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:21:44 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x2, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioprio_get$pid(0x1, r0) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_user_passkey_req={{0x34, 0x6}}}, 0x9) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x0, 0x0, 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_gt}]}) [ 3040.329298] loop1: detected capacity change from 0 to 40 17:21:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x400000000000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) 17:21:44 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:21:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x500000000000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) 17:21:44 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x0, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:21:44 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x2, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioprio_get$pid(0x1, r0) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_user_passkey_req={{0x34, 0x6}}}, 0x9) 17:21:44 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) [ 3040.519915] Bluetooth: hci7: unexpected event for opcode 0x043d [ 3040.522179] Bluetooth: hci1: unexpected event for opcode 0x043d 17:21:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x600000000000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) 17:21:44 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:21:44 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x0, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) [ 3040.694270] loop1: detected capacity change from 0 to 40 [ 3040.760231] Bluetooth: hci1: unexpected event for opcode 0x043d 17:21:56 executing program 6: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x0, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:21:56 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x0, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:21:56 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:21:56 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:21:56 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:21:56 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x0, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:21:56 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x2, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioprio_get$pid(0x1, r0) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) 17:21:56 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x700000000000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) [ 3052.204369] Bluetooth: hci1: unexpected event for opcode 0x043d 17:21:56 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x2, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioprio_get$pid(0x1, r0) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) [ 3052.226413] Bluetooth: hci7: unexpected event for opcode 0x043d 17:21:56 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) 17:22:08 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x3, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:22:08 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x0, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) [ 3064.030137] loop1: detected capacity change from 0 to 40 17:22:08 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x0, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:22:08 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:22:08 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x0, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:22:08 executing program 6: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x0, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:22:08 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x2, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioprio_get$pid(0x1, r0) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) 17:22:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000000000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) [ 3064.089457] Bluetooth: hci1: unexpected event for opcode 0x043d 17:22:08 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840), 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, 0x0) r5 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpid() ioprio_get$pid(0x1, r6) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r6, 0x8, r5, 0x9) fgetxattr(r5, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:22:08 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x2, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioprio_get$pid(0x1, r0) syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_user_passkey_req={{0x34, 0x6}}}, 0x9) [ 3064.150192] Bluetooth: hci7: unexpected event for opcode 0x043d 17:22:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x2010000000000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) 17:22:08 executing program 6: syz_emit_vhci(&(0x7f0000000080)=ANY=[@ANYBLOB="042fffff2ed2e2b858debe4fd2f341467efd94e5ceadfece6bb546ed4736c713e7f7fb631c9f793eb454a048ccf6a054853fc3104e9444881601700ca5ed329db2"], 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x1, 0x3, 0xa}, @l2cap_cid_signaling={{}, [@l2cap_move_chan_rsp={{0xf, 0x24}, {0x9, 0x9}}, @l2cap_move_chan_cfm_rsp={{0x11, 0xd9}, {0x40}}, @l2cap_conn_rsp={{0x3, 0x1}, {0x3f, 0x40, 0x1, 0x1}}]}}, 0xf) 17:22:08 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x0, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:22:08 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:22:08 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x3, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:22:08 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x2, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_user_passkey_req={{0x34, 0x6}}}, 0x9) [ 3064.252001] Bluetooth: hci1: unexpected event for opcode 0x043d 17:22:08 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x0, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) [ 3064.292973] Bluetooth: hci7: Malformed Event: 0x2f 17:22:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x4800000000000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) 17:22:08 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840), 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, 0x0) r5 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpid() ioprio_get$pid(0x1, r6) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r6, 0x8, r5, 0x9) fgetxattr(r5, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) [ 3064.305399] Bluetooth: hci7: Malformed Event: 0x2f [ 3064.393326] Bluetooth: hci1: unexpected event for opcode 0x043d 17:22:21 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x3, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:22:21 executing program 6: syz_emit_vhci(&(0x7f0000000980)=@HCI_VENDOR_PKT={0xff, 0x80}, 0xfffffe27) 17:22:21 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840), 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, 0x0) r5 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpid() ioprio_get$pid(0x1, r6) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r6, 0x8, r5, 0x9) fgetxattr(r5, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:22:21 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:22:21 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x2, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_user_passkey_req={{0x34, 0x6}}}, 0x9) 17:22:21 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x4c00000000000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) 17:22:21 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x3, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:22:21 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x0, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:22:21 executing program 6: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)={'#! ', './file0', [{0x20, '}+'}, {}, {0x20, ']%'}, {0x20, ')(*$&]^)}.:'}, {0x20, '['}, {0x20, '.{..\x00'}, {}, {0x20, ')}\\\'%'}, {0x20, '&'}, {0x20, '!%L'}], 0xa, "b266edec716e752298e4dc03f9e5be28b1b972e9266a7fa6abf5850040c3cc1964fb00a2bb097f183704b51dcdc002a39964b69c73f077b91e7970b31f8834e01632"}, 0x75) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000000c0)=0x5, 0x17) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="0456fc8a4984d59cfb9dc687042f0100"], 0x4) 17:22:21 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x2, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_user_passkey_req={{0x34, 0x6}}}, 0x9) [ 3077.649158] Bluetooth: hci1: unexpected event for opcode 0x043d 17:22:21 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x6800000000000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) 17:22:21 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x0, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:22:21 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) [ 3077.767349] Bluetooth: hci1: unexpected event for opcode 0x043d [ 3077.780265] loop2: detected capacity change from 0 to 74 17:22:32 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:22:32 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x0, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:22:32 executing program 7: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_user_passkey_req={{0x34, 0x6}}}, 0x9) 17:22:32 executing program 6: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs2/custom0\x00', 0x802, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000080), &(0x7f00000000c0)={'L-'}, 0x16, 0x3) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1, 0x11, r0, 0x0) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="0447011d22ff2a982900"], 0x4) 17:22:32 executing program 5: syz_emit_vhci(&(0x7f0000000080)=ANY=[@ANYBLOB="042fffff2ed2e2b858debe4fd2f341467efd94e5ceadfece6bb546ed4736c713e7f7fb631c9f793eb454a048ccf6a054853fc3104e9444881601700ca5ed329db2"], 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x1, 0x3, 0xa}, @l2cap_cid_signaling={{}, [@l2cap_move_chan_rsp={{0xf, 0x24}, {0x9, 0x9}}, @l2cap_move_chan_cfm_rsp={{0x11, 0xd9}, {0x40}}, @l2cap_conn_rsp={{0x3, 0x1}, {0x3f, 0x40, 0x1, 0x1}}]}}, 0xf) 17:22:32 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x6c00000000000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) 17:22:32 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {0x0, 0x0, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:22:32 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) [ 3088.804544] Bluetooth: hci4: Malformed Event: 0x2f 17:22:32 executing program 7: syz_emit_vhci(0x0, 0x0) 17:22:32 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x7101000000000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) 17:22:32 executing program 5: syz_emit_vhci(&(0x7f0000000080)=ANY=[@ANYBLOB="042fffff2ed2e2b858debe4fd2f341467efd94e5ceadfece6bb546ed4736c713e7f7fb631c9f793eb454a048ccf6a054853fc3104e9444881601700ca5ed329db2"], 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x1, 0x3, 0xa}, @l2cap_cid_signaling={{}, [@l2cap_move_chan_rsp={{0xf, 0x24}, {0x9, 0x9}}, @l2cap_move_chan_cfm_rsp={{0x11, 0xd9}, {0x40}}, @l2cap_conn_rsp={{0x3, 0x1}, {0x3f, 0x40, 0x1, 0x1}}]}}, 0xf) 17:22:32 executing program 6: syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="8dc0e36cfe74d95ad4b6b16919653e"], 0x4) [ 3088.879500] Bluetooth: hci1: unexpected event for opcode 0x043d [ 3088.923468] Bluetooth: hci4: Malformed Event: 0x2f 17:22:33 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:22:33 executing program 5: syz_emit_vhci(&(0x7f0000000080)=ANY=[@ANYBLOB="042fffff2ed2e2b858debe4fd2f341467efd94e5ceadfece6bb546ed4736c713e7f7fb631c9f793eb454a048ccf6a054853fc3104e9444881601700ca5ed329db2"], 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x1, 0x3, 0xa}, @l2cap_cid_signaling={{}, [@l2cap_move_chan_rsp={{0xf, 0x24}, {0x9, 0x9}}, @l2cap_move_chan_cfm_rsp={{0x11, 0xd9}, {0x40}}, @l2cap_conn_rsp={{0x3, 0x1}, {0x3f, 0x40, 0x1, 0x1}}]}}, 0xf) 17:22:33 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {0x0, 0x0, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:22:33 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x7400000000000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) [ 3089.011283] Bluetooth: hci1: unexpected event for opcode 0x043d [ 3089.017347] Bluetooth: hci4: Malformed Event: 0x2f 17:22:44 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:22:44 executing program 6: syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0x1}}}, 0x4) syz_emit_vhci(&(0x7f00000009c0)=@HCI_ACLDATA_PKT={0x2, {0xc9, 0x3, 0x0, 0x104e}, @l2cap_cid_signaling={{0x104a}, [@l2cap_create_chan_rsp={{0xd, 0x80, 0x8}, {0x1, 0xe1ff, 0x8000, 0x5}}, @l2cap_move_chan_cfm_rsp={{0x11, 0x3, 0x2}, {0x2f}}, @l2cap_conn_rsp={{0x3, 0xff, 0x8}, {0x200, 0x1000, 0x400, 0x1}}, @l2cap_disconn_req={{0x6, 0x3, 0x4}, {0x1f, 0x800}}, @l2cap_info_rsp={{0xb, 0x0, 0x1004}, {0x5, 0x4, "d9f11edc99773615d4db2d1c2dc81f87d2a7e868c63a208cd22261b9112fcf8b8957e8f61d9b7b179ae97ceba770199f9670c8f0f54283b9a306f29e2a8ecde9bf0e609aeb90fa3244dcc3ce22e6dd3279ebca20e3fd64d8681f7d3cbb677c117cc8ecc2f16a6aeba13e4633e287db9b68abcf00586cefc1943c12b209e7bb9d34f63569eb3ea081275bd9ea2cbb4910136d689b70d0a6a1a7b6392a8dc6005737d385f691550bc48c1b786a5234fb69cd69866876cee10051ba9f91808d34d2da8d315b5b878f74ed740e0d1f71ae2e4aa479bda0f0eb0e4a51c305a5900ad350b9f9587e12aeed2b097b33acba8bb2e20cfd3dc66478950b287d48f9b6c66ae67563690fe6da607c8ad3f296832249e67b5855151194f408e20aa8090c191090cccd4bb28c3f14aaf54c8c523b296313e24946d3a9adcfd72d494cc6101f8b19e674a7d3a0401aab2045efc50888fa12f0903ff56c586e087ffb58f04a01d5bc0541e5b819521c204f0c0fe49c835de88830e8c89c14306aed145141c732860c5c16c8ff3b73fa166ce09c393243c4c3b30c879fda1b23e97f1ae0548c22dd4a7561b29493155c1c72e9d17a8454b4212695f2108ae2cba809d6cb0c69fd9078df571ef63dcc55d9ab8e5642eaa799114f3cba8a6fe702ac70755217165f70350b6c76f162919a625675cc10a747824d79df146c87ee3e81741943a77adf2cba36565adb9369cfbf0c665717dea4e22dccad5214a7cf5589cb8193e752e4a05825769e4b9e5ca6f3416e36b6dbba17ff6932a9f5ea9a7ad0dbff6db24d82c270d9ee8f45f801b5c4eb45e9e0b1c762431b4d79f7c2f12ce33b509665e36962ec31cc29b62b822d49369b29210fd1d37ca56d081fd8a5253f81091d3fb3280db5d07e4e8343b4af19e6d9bbc25a66c8f7d54d0b0a83f51601090a0b2a061c02d3244df7179a0d6000ad4d3cc731bf9cc8149645aff86c7d7b99aea538f696d17c0ee8875c7a76840aee3cb953e704653b48dfaf8be6ff6092eb5d983efd87db9047b928f82bf10f5d855ba20d612673de9da7dc47970338519c81029311fe7e56d26f706a784b7a59fade6b78a2e4ac96409fcd28bd94ba8a5f9ee6e54bb17e6f5f2808d9a31bbcca97d8a00495802f45d2e3178f36ada7f7b64713c6c1af0ad0f9c1b1bca4d8c5844c0fab273e0065cf6d16b4f4bd8d0dde41343ea0a61caed7a6845c5fd1236eb7b62ee71a872c4fde4487e23b4b208a0f53dea5363a1f62a04af120945eed501a8b0d5b5868163befff1652f730138cdc6332a0cce1e67fae6c7d20ab4b9da03747f9d013b3002ef3636343646f0815dffb063d87c8067ba10af94e5e02158dcc88a99242bc547e59adf6b02371aae0721f3f7e80856d11c25111dfebfee116cc728896ca81c24a8e9dce5902144fda8e7866b02f303e70e840503c705cf420aa3b6dfb87e7c520a5ebc580fb4d43f48430c6ebd575335d8bed5f960bf4126e6619b5e1d18ce5c2ceac19b378c1a5c72d40eaf0b76406b53bb249d47920d00ffd6d8357ba0e44fc84af0d2e38aae25a399d8fb626066bba9c25c8f2485d8d4d1a44994b1d45884a7b85f898032f26ac39384a1639ff28857554e3d28198f113cc7d899581f0521fcbd2f4e60a2ed9be2c19f8c0a9db2b8715de8e5b4af9e6d877224d12529343299bfbe675e39d7880dc87dd5eb37d15ec60bf8d196fe69d524b7b25274d599c83200e1319270427540ed5a5e8466ac9094ed8fb79f4d820c4c64bda02d9e74d65e70f5d1c62e014e31fd77eb39de684956edc94e5f30f744f88dcb42de1eecc07857f850034dcda70ba59e0a5f11db8412f8e7321fa71d14ee2c1e919d2dadb6ea66b9deb7c0a55a55ac3b1f3df5867760987d412df69d0034d89e2f751ded7e453e38f916c7d5821ab7e6f1669b98d9acff32078a684253c54180807590bb201fb3bf3f0afdd1817acb82b7e97cec3f8a9a38dd13b1fecf04411d94eabba2e6e58586b72082e3fe9ca1390505730fb23188c84b08be3f45d0a3bc520ffa940faf42c938319d706c419ac61eeb86e411ad01f584546060b2f370b6ff7e6e0cdf331e7a2c9658f71aca62a205b626cbb3cce122ea877155442e01c30fe505da6b908652af2aa0764fd27f8eba6e3bf67fcd16430096800814c2a18a892669d1577f9d21ff955fc25544b8e1a3cf6e86a6e127fcee4034a6aa7f863eb2361469b11ee253e9793a552436d223f6a9f40ec9dc0b74a89e95e202118e25a7b75a1a3f613d8e1d7262e445f7bb4391227904fc024a41fffee609d035d1979f7fe2eda328694741cc5e978a96c1a04dd7d8c683eee5bd1fee4c24b7e31619afc0b7d9191a4c3570692e1e71a302e0190b3b2706a21a12ce592d93d3c564e6b4b5f9b2c7fd326babc5b6d3d2efa99f1ec266a64dc20bc1edbe0a7252109b3f77e3341b8bd9fc8b85c756db345678121a8f60f65424814ba236156a33d2a30c0a14cb58c870fc2f839d750d3805bd9dddada7ce4bc9797c074ec91e0dc1f750a3e3a26e902f8b7da13a6e0805ed407775c0f7c8a763787ec8fe0f24e70cf71b56795936c8b7c2598f5e82a9f797c9e4b328d2b4fe9e9ea9f336fb469188f48241851eca5d3ac1ed4ad6afe4140f99695f861f93712d2a8bdd5e69a7ecc3c30e11b01f498d43faaa454dcc8d0585d3dbe6b14b66f09c0f9b66e8e96375b6a5634d6b858fb0eaa8c464e093967a542e255795472f39b1979d5366f63e535a31326536f8a97c34db0329862ebfbe9bbc664d405ec36fc73f39e604180aa924703a14bf7d86b5f1814adcdb8f8bfd1da34328f4cf63962612d9af47c615ef75641d0cd63257ebe9ab487c351a03f6e50bb8117d147d8a4149472831ccbaeddbc21f9dc831a77d9e82a1ada4cf355f9888063c3ac7c41b92251fd201ab20fb86943ff5e3cdc70bc5dd950511e519ff59befcc18d451d03a9dabcd100b3d6d8095ad9d9c8f34e4584e13dc4a3ad4b191117bef07d8b8e97638dd273cadec4a6b58a228fc95777131e4f2a112d10beec95a566dd8036c62aa540d8ea89e466fc9bb496020b1afc85e2eff914a14e0daa57eaac0d316a4f5bcc6f51530ad295b80889d5dca1bf8690773fb50fb65b4c361e9dd264ee3be4bbc686daf21f9ffef580235bd6202df1fbc91e710634aba2917ac4be11ed7601759bbe91392900477f03374303d0cdd88de25b8332dd6637c8f2658d1847fd38f9f60c6991a9c8edd96bcbc07e0b2fec7abcbce51cef159faa977ad0d1f46e7f697960606fb8271145fad80fe96046439e081daad728ecdf7763a8aebf56ea21eb8d018fdb2a7c28eca255b9019cd60d8dffc96e4a461debec8597387771974f07cf00f88c9db1ab0d1061cb9292ec1bbe22e12f0ce1c2e4a1f73d0fe377820eda9b8d0818105207cbd3b10bd026b70f7dfcfec0377d23dbfec68077bee4c0199b248ce3200fe7df869eda2c212c0bc77a2da9ba2802fef6a55161d95bfc4520a3bb030d03796e381ff92cbf927427b928b660dc18ce9ca584c96c0a0d11972e8dfb648569efa8215946de1229977d26fc1e601381ccbf8aab9d388ed85b00078a257fbefa391bb9920a34cab400e1797dd50935ffb069777995c20900ccce9fa3a9f692f924e9bec41ac18f805f8b1470eac43d4bff44142ee93df104b8c3ec69a0e1cce29d4edc54eb70b574e1bec60b96c58db4e53e730df85a6736261a505ed736f1a01700fbc7aea534f0b92904ed8a70bead4bc3114395169df65a66f7add332b330a802be6b362722e3b14e8dc4b830921a0d3a41518ad072992543baa958a9dfd0eb540be559905a40b233159e7c625186dd4b00f09e4dcaa9bcbaa33b07f01d7506c7a5ac2f73f192b373584ef2e5143a24385addb56ffa3fd94a526e799f5b560d258931495f7e15281e1d116de48926a7ed427933e2eb5393d6c8f36b6fc32e646277832573053087e1908ec9da8f65457541c82fdca9a8ffe59d3ff4affb458fbf6f079ce1a8392ebeba68c22afcd7a4c78b3988c8e37d066100b02f8bfd564c36c327662c41d1d29151cec534249a48d507deba6898fd722aa8cc17f057277dd307eec9b8d8626602851d0bbc53d0b5b6ab83328f87396f28928e4dfae066c45d090c2ba50ffe4cae050fcb7e09ec2d878a2213e4e689cdd32a1ad6380bbc962626e3b743e21f7f32c1ba72b6f425eed730917c8217dbd8013ae49f74eeff488858115259e06d95d868c61c270cff37eb699ce93f677924b24de3cc0afd348c3c043e8ec14020f6d8b84f5d49c6c889e9145fc1b11e52e531a931ae5114891e8773e1536014075f5b50f69d1597c61d5b07d8f4fecf0175b8854b81c6ee08d38d954af4df6f2dd0b91e43a0c0b8b9d235342863a6fec9d05d3cb5dd4784dc7fc620d207aaf27aea3d5d2f20331dca15d6d2605ff504acd1da2b774e742e5db602671203752ca9defb987dc54df00790f55cada0d2c99530f5b62f03aeb578ba747ac654c21fe6c483997d428b36dfbae88bf24a2ca9c8c22917a5f19860a73af9ec75a2c959d83893eeb0d053fce0eb19242f4e1e7a0829df8198f164671b26da9eef36b182c0f4dceec5554e122ab259cbed37e0504ad48d864bf8df57b501f656afb41c1318b7a27706146e150a7edd9d8f0f016a6564a17210f93d1ab21c85ce7df02bf1d085fad02593ffd7e1d42f78023f2e19c0b1f29658f6ba8a9e8db307374cf6917274cdf78830a60112312e5b4abaef1f4868231787e2fc16b5ef6b667d87d1cc16d7ed6eaaaa567e3cc9b24f54b4e2fe8651b320b89ee351822c9d69f7d365258c8e6268e551dde963d307da96eebd2e1c9f7c2b9d1dc0838fc6f00cf98f590be853eb5e785a00766a4045ae038f384f1647c543c9093fe183167e0ff22e9bfe7c5a23f7ecea1632b98c32c896de4bb6dbf2e15ff6b1378b6ac3f2f7edd81670e01aaeec9d5545352cc1c26dd16ebdeaf1f9875b3cb035b4e687cb65f79247eeacf8d99d41ba02bb853c9c286a84aa95e0fbe1bd5d3e202abb2095c144c2f110d998265be4d7ed52f9995d174af007f7c9d1c0df6faa82ff106a2c40ca6c1f9baf992ac8a28ff3b9c289f74fe066b46fb634c2b1c3833dea8d5e355cea1bfb000611206274d1a9c490af03bb383ea634a148712f0cfbbedf9cb43d93a2c4d8fa5dd1b2a9cdde26a97edd34665ef6a266ab3513bdeaac4fd6bcf16842cf665ddafed5bdcfdc5dd68a55b4fb2860a08e12dc4580a12bcfdedce6306117b5ae81b32953a4f463fc270a0759f8ee5fe72338c05675ab36510873e8bbe344dc1c0ae595c79b5f2534b14f1c6010a0a8c0a1bba1e5c0dde03c1abdffa14c88c2938e94bf7593049db7f7157fcf13bda0143c00b0c6007f8eea2aa9e67f1901cb33ee72de74daa29da12b1115c454b51f634cf93aa929cf5d593ef879d4283c4dfc82d8fca6b09634bdccbda17a361978bacc5a602d2f66b171e7a8cbc8d09703fc89cd1768bbc8d621a838596aebc46beb866064a793315ba1ec6be1166d71ab543076caac18a6c30cd390a3cc3c4fc2c0de99bc50681ba07858c53721e47bb3458814eb793c9bee80bd5217db4cb2fdae75963311ed45a2c8749c69c12b78a0426c94eac9a43b4b724e0ba6a88fc5dca8ad0814ec746d83475da92694b3f0b1b51cafc722bf6afd043a7c56e0867a33993a278511f3287ce5c831060c6d0a3ff1dc8a0f9d344927e0b2750e454f40180ad2a4ec74c95c1dd"}}, @l2cap_move_chan_cfm={{0x10, 0x1, 0x4}, {0x3, 0x7}}, @l2cap_conn_req={{0x2, 0xe0, 0x4}, {0x211, 0x9}}, @l2cap_move_chan_cfm_rsp={{0x11, 0x9, 0x2}, {0x400}}, @l2cap_cmd_rej_unk={{0x1, 0x4, 0x2}, {0x80}}]}}, 0x1053) 17:22:44 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {0x0, 0x0, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:22:44 executing program 7: syz_emit_vhci(0x0, 0x0) 17:22:44 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:22:44 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x0, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:22:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x7a00000000000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) 17:22:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, '\x00', [{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, {0x800, 0x0, 0x80000000000}]}) recvfrom(r0, &(0x7f0000000240)=""/235, 0xeb, 0x40000000, &(0x7f0000000340)=@llc={0x1a, 0x305, 0x9, 0x3f, 0x6, 0x20, @broadcast}, 0x80) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x0, 0x200, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x2}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x40}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x2}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x20000000) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x102) shutdown(r0, 0x0) 17:22:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff00000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) [ 3100.884125] Bluetooth: hci1: unexpected event for opcode 0x043d 17:22:45 executing program 6: syz_emit_vhci(&(0x7f0000000040)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x1, 0x2, 0x5c}, @l2cap_cid_signaling={{0x58}, [@l2cap_move_chan_rsp={{0xf, 0x4, 0x4}, {0x6, 0x1fc}}, @l2cap_disconn_rsp={{0x7, 0x20, 0x4}, {0x5, 0xfffd}}, @l2cap_disconn_req={{0x6, 0x80, 0x4}, {0x100, 0xd21c}}, @l2cap_move_chan_rsp={{0xf, 0x3f, 0x4}, {0x9, 0x5}}, @l2cap_move_chan_rsp={{0xf, 0x5, 0x4}, {0x6, 0x800}}, @l2cap_disconn_rsp={{0x7, 0xae, 0x4}, {0x9, 0x4bc7}}, @l2cap_conf_rsp={{0x5, 0x55, 0xd}, {0x9, 0x569, 0x2, [@l2cap_conf_mtu={0x1, 0x2, 0x8}, @l2cap_conf_fcs={0x5, 0x1, 0x1}]}}, @l2cap_create_chan_req={{0xc, 0x2e, 0x5}, {0x8, 0x9, 0x5}}, @l2cap_info_req={{0xa, 0xf1, 0x2}, {0x5}}, @l2cap_move_chan_cfm={{0x10, 0x2c, 0x4}, {0x6, 0x6}}]}}, 0x61) 17:22:45 executing program 7: syz_emit_vhci(0x0, 0x0) 17:22:45 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x80, 0x642) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x1, r2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r1, 0x9) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) syz_emit_vhci(&(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) 17:22:45 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:22:45 executing program 6: syz_emit_vhci(&(0x7f0000000300)=ANY=[@ANYBLOB="040d141f0000b7feffffff02100000060000000104000044d23be49c379c48710c464ff88d6c7fc6ae3f0316178015a10aee99ef36f940bcafc2725878c896edc92f6682ac8b1490a4e6e95466ae19ff655d37e8ec9e01245d56ae10463e6edb5ed0e8e076e1aada8e12eb551be26c29e28f8d9bdbc694170eaf3d215dbf59e5411ba1ea5d5a3f2dfe15fc782466f500ae15139a2d1fefacf2c8fe125001b576b65212b9735305b7b3502844421d2488d57afcf50968b9a8ebf1ab67582746950aafce20fc19426d65842a9e3805c2f396c7453214f0fb49444afdf5ffc3c1"], 0x17) syz_emit_vhci(&(0x7f0000000040)=@HCI_SCODATA_PKT={0x3, {0xc9, 0x44}, "63709226a50d138417eba2d7a7b95049c48a10921b0460e03ad7e40e985b1784ccc9b525dda9c833cfdf41fc565c16c34ccb705870111c744b4a59c119422555913234a8"}, 0x48) syz_emit_vhci(&(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) syz_emit_vhci(&(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x123) 17:22:45 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0xf000000000000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) [ 3100.998216] loop1: detected capacity change from 0 to 40 [ 3101.053805] Bluetooth: hci1: unexpected event for opcode 0x043d 17:22:45 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440), 0x0, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:22:56 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440), 0x0, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:22:56 executing program 6: syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0x1}}}, 0x4) syz_emit_vhci(&(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) 17:22:56 executing program 7: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000100)={{0x2, 0x4e22, @private=0xa010100}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x2, {0x2, 0x4e24, @multicast1}, 'tunl0\x00'}) syz_emit_vhci(&(0x7f0000000080)=ANY=[@ANYBLOB="49b1eba0a357133c1786882d4d8be1b2088eeb7ee31381087cbef3f541e2c0616df51e75f735b04f4050001a338024f0a52f8400f6ee1c01f3adc25d64dba32c1c6dcf6fd61a7ae185b78170f144551047a2a7e5efb154352354483278e30000"], 0x9) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000002c0)={0x6, 0x80, 0xfffffff8}, 0xc) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, '\x00', [{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, {0x800, 0x0, 0x80000000000}]}) getsockopt$inet_buf(r0, 0x0, 0x20, &(0x7f0000000180)=""/249, &(0x7f0000000280)=0xf9) syz_emit_vhci(&(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x1e1}, 0x2) syz_emit_vhci(&(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) 17:22:56 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:22:56 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x0, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:22:56 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff00000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) 17:22:56 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:22:56 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'b\x00'}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd8, r1, 0x200, 0x70bd2a, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x2, 0x71}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x3, 0x1c}}, @NL80211_ATTR_MESH_CONFIG={0xc, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HT_OPMODE={0x6, 0x16, 0x13}]}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x6f}}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x9, 0x70}}, @NL80211_ATTR_MESH_CONFIG={0x2c, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_CONFIRM_TIMEOUT={0x6, 0x2, 0xb9}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0x59}, @NL80211_MESHCONF_HWMP_MAX_PREQ_RETRIES={0x5, 0x8, 0x5}, @NL80211_MESHCONF_GATE_ANNOUNCEMENTS={0x5, 0x11, 0x1}]}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2c}, @NL80211_ATTR_MESH_CONFIG={0x3c, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_RETRY_TIMEOUT={0x6, 0x1, 0x43}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x1}, @NL80211_MESHCONF_PLINK_TIMEOUT={0x8, 0x1c, 0x4}, @NL80211_MESHCONF_AUTO_OPEN_PLINKS={0x5, 0x7, 0x3f}, @NL80211_MESHCONF_HWMP_ACTIVE_PATH_TIMEOUT={0x8, 0xb, 0x8f32}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x1}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}]}]}, 0xd8}, 0x1, 0x0, 0x0, 0x4000090}, 0x4000000) syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0xff}, {0x1, [{@none, 0x0, 0x0, "c30c5b", 0x0, 0x0, "db30ba492ae7cebc05283ff7316f6f210553ec196d4a18ecf5d01dc1bf997ef13579191093ad7c2097050b9b51724181ceacef3154a0e7263bc3589c93be7217c652e0837c4276244b75a00d7d152938e796920a4def61bae4095fb54159a062fd16816dc45c62affc0a91db419bbaeab0975ae432f34d200d365d0df346882e2c547258e57cab65b7477097aec25c74fd123058f55e16b6a37b2da87d7804ccb4c46e8c72ea562bc610c7c24a1d06577f0b55e43d6f6df8af0fd111dff06245bdbacef41a361bf59e6d1c39bd00d0e256fd63c4e234416496c3c3aae648f90660982ffc989e8bf6535c8c9f54dbf7c9"}]}}}, 0x102) syz_emit_vhci(&(0x7f0000000000)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x0, 0x1, 0x18}, @l2cap_cid_signaling={{0x14}, [@l2cap_conn_req={{0x2, 0x6, 0x4}, {0x0, 0x100}}, @l2cap_conn_rsp={{0x3, 0x3f, 0x8}, {0xfe01, 0x54e, 0x3ff, 0x7}}]}}, 0x1d) 17:22:56 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0xfa0c000000000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) 17:22:56 executing program 5: syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="042fff01ffffffffffff0000c30c5b71e33a8d3cffb5721ecb1ea1000000db30ba492ae7cebc05283ff7316f6f210553ec196d4a18ecf5d01dc1bf997ef13579191093ad7c2097050b9b51724181ceacef3154a0e7263bc3589c93be7217c652e0837c4276244b75a00d7d152938e796920a4def61bae4095fb54159a062fd16816dc45c62affc0a91db419bbaeab0975ae432f34d200d365d0df346882e2c547258e57cab65b7477097aec25c0800000058f55e04ccb4c46e8c72ea562bc610c7c24a1d06577f0b55e43d6f6df8af0fd111dff06245bdbacef41a361bf5fab21c39bd00d0e256fd63c4e234416496c3c3aae648f90660982ffc989e8bf6535c8c9f54dbf7c900000000000000005801aefa2046f8cf88170fe9e621e7c6c34b0b610493418e732d6f0330382546b33d658952d6c90e58d256b40a7a9547a712a3bce4cdce6ef36a30234a723ee711b4d3cce2d900d3f7e3b49cc65b5f31e94d69a15c34715c5275d06b5a0faf8e6bede9f7c87299708d8c87fafff69dfbd9021800f6481d9c36a1ba6b7c7e2cf2bd7dd45b8782d636dd6bca07b33bd3f8cc19cd5c0648e1cded"], 0x102) 17:22:56 executing program 6: syz_emit_vhci(&(0x7f0000000980)=ANY=[@ANYBLOB="04000300"], 0x4) [ 3112.729338] Bluetooth: hci1: unexpected event for opcode 0x043d 17:22:56 executing program 7: syz_emit_vhci(&(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x4d) [ 3112.772779] Bluetooth: hci7: Received unexpected HCI Event 0x00 [ 3112.779969] Bluetooth: hci7: Received unexpected HCI Event 0x00 17:22:56 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:22:56 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffff00000000, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) 17:22:56 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:22:56 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440), 0x0, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:22:56 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ioprio_get$pid(0x1, r1) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r1, 0x8, r0, 0x9) poll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x442}, {r0, 0x101}], 0x2, 0x80) syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0xff}, {0x1, [{@none, 0x0, 0x0, "c30c5b", 0x0, 0x0, "db30ba492ae7cebc05283ff7316f6f210553ec196d4a18ecf5d01dc1bf997ef13579191093ad7c2097050b9b51724181ceacef3154a0e7263bc3589c93be7217c652e0837c4276244b75a00d7d152938e796920a4def61bae4095fb54159a062fd16816dc45c62affc0a91db419bbaeab0975ae432f34d200d365d0df346882e2c547258e57cab65b7477097aec25c74fd123058f55e16b6a37b2da87d7804ccb4c46e8c72ea562bc610c7c24a1d06577f0b55e43d6f6df8af0fd111dff06245bdbacef41a361bf59e6d1c39bd00d0e256fd63c4e234416496c3c3aae648f90660982ffc989e8bf6535c8c9f54dbf7c9"}]}}}, 0x102) 17:22:56 executing program 6: syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0x1}}}, 0x4) syz_emit_vhci(&(0x7f0000000000)=@HCI_ACLDATA_PKT={0x2, {0x159, 0x0, 0x3, 0x1a}, @l2cap_cid_le_signaling={{0x16}, @l2cap_ecred_conn_rsp={{0x18, 0x0, 0x12}, {0xfff, 0x45e5, 0x8, 0x3, [0x2, 0x1000, 0x3, 0xfff, 0x8]}}}}, 0x1f) 17:22:57 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x0, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:22:57 executing program 5: syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0xff}, {0x1, [{@none, 0x0, 0x0, "c30c5b", 0x0, 0x0, "db30ba492ae7cebc05283ff7316f6f210553ec196d4a18ecf5d01dc1bf997ef13579191093ad7c2097050b9b51724181ceacef3154a0e7263bc3589c93be7217c652e0837c4276244b75a00d7d152938e796920a4def61bae4095fb54159a062fd16816dc45c62affc0a91db419bbaeab0975ae432f34d200d365d0df346882e2c547258e57cab65b7477097aec25c74fd123058f55e16b6a37b2da87d7804ccb4c46e8c72ea562bc610c7c24a1d06577f0b55e43d6f6df8af0fd111dff06245bdbacef41a361bf59e6d1c39bd00d0e256fd63c4e234416496c3c3aae648f90660982ffc989e8bf6535c8c9f54dbf7c9"}]}}}, 0x102) syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_pkt_type_change={{0x1d, 0x5}, {0xfb, 0xc8, 0x7}}}, 0x8) 17:22:57 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0xa, 'root'}}, {@uid_gt}]}) [ 3112.956976] Bluetooth: hci7: ACL packet for unknown connection handle 345 [ 3112.984133] Bluetooth: hci1: unexpected event for opcode 0x043d 17:23:09 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x0, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:23:09 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0xfffffffffffffffe, r0) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$IEEE802154_DISASSOCIATE_REQ(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r1, 0x20c, 0x70bd2b, 0x25dfdbfb, {}, [@IEEE802154_ATTR_COORD_SHORT_ADDR={0x6, 0x8, 0xaaa0}, @IEEE802154_ATTR_REASON={0x5, 0x12, 0x1f}, @IEEE802154_ATTR_COORD_SHORT_ADDR={0x6, 0x8, 0xffff}, @IEEE802154_ATTR_COORD_SHORT_ADDR={0x6, 0x8, 0xaaa2}]}, 0x34}, 0x1, 0x0, 0x0, 0x24000049}, 0x2000) syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_user_passkey_req={{0x34, 0x6}}}, 0x9) syz_emit_vhci(&(0x7f0000000100)=@HCI_ACLDATA_PKT={0x2, {0xc9, 0x2, 0x0, 0x12}, @l2cap_cid_le_signaling={{0xe}, @l2cap_le_conn_req={{0x14, 0x6, 0xa}, {0xff, 0x1, 0x4, 0x2201}}}}, 0x17) 17:23:09 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f", 0x58, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:23:09 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:23:09 executing program 6: syz_emit_vhci(&(0x7f0000000140)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0x3f9}, {0x4, [{@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x6, 0xc1, "af2e30", 0x4, 0x2, "769c3f3958ac5bda8cf76ad42a5b035ef56f65100619b0e3596b2dfa18ca4fb6bb1a59322637defe10c70e11ecf43edcfe4c3a428c016d4c9d94757c57d51fc2c8c3092dff4576514c92ed647593e156df64515695155c6bf65ed5f7f5ed9c1c6b2c04ea25a85eef0eb88e280b6ab947672ca7e48b10ceb683710a6aa05d197c44ac1c267d6ecba90be3ae01b22f7f039d2c9d1f29f8a7341ca394673e8a7b7984a588cb39fe42280e1328679dc3cf54d5e3da55ac9146e14b8bbeea67594abb723658a95130e884112c23f97100eafdbbf0638abeab0b183ab33a7ed1bb926b9b1b333083740c3a4e69ed7d9cfbf63f"}, {@any, 0xc0, 0x7, "f7981c", 0x1f, 0x1, "b3a1f71a92891fe93fbd6181793704afe89413389ed1c5a4810e4481f124e9f3666ddf28ecbd156a870bb743b1dc08c8e3428b1258eaff0180eed2da209f3178949c978beba2ccabc88af50436bf985572ab206d117aac06e14b6cf5d1f320305f82e1ce64dfd1891b1b8f28fa0fad94995ba6099d89b6a5203ac21e2450acedbb8491694d57de63bcbbe09e9607697ad2f7d90232c2f128e7cf094bff2b146491eb7b6344ea34e98c36124d2d64f2beb5674531c8b6637dc767401432684de79d9fc1dad52d5f0a2719c0b4c61750af86c00ed03107c388f8211bbc26d4e34fb2dedbf40d0409e2af47b849f47c09a8"}, {@none, 0x17, 0xff, "bc528b", 0x7, 0x20, "6c52a519866ca59de1abb972cc4a1e257f093eeb734d957a70e9a2a45b9dced2f31feb97111a98da217447d5840c9270bc96d6a024db484ac10de5e3a815d4d6ef37467c58a2325e1f60391e8ec5d7bc2787c25e05720f4585bf20a9dc4bb8b5080543dee2512a2d7c1c38ebace1d49e330a0ad6533995b619f3431375b0c5b290aec4a82af5aa205632775d48df234d6f188e2de787bcc6ff389b48809096d6a10ba2da43a11a5f1eb8e7ab5aea5d4bd041976ce7eed1d2e0714be59293b9c53f48a1d76bedd61b72e3461beddb24e037c9d83cdf2c8d885a47a14e67f53aa915f3502d17f5d7ae560cc4d0df8c05ca"}, {@any, 0x80, 0x20, "ed3a10", 0x8000, 0x4, "175dbd5339a7236e9c3d240ee77d4fa8f3167839dc3a12166bdfe1b4c2ac19a63ae9dd0d9ab2726f3b37c8cd1d281df6870caf2e57aa1295e6065c97490cee69785730bc1504b4d85764e80622d80f5af84c66df14b79036a9a91410492ae0a2c61aad65ee086ddf582500ceee6ce7f71e090b56420b70d7b925bba71248519d327a6f71b5eaae5616cacccff4ff915fe9c4950f32f4b297f258cca70272643a80dc2bf65f3143592d667c45b69066e859f73d8d21b0f0f6311e38a1162423129626059327cd74b17a4dc1ede5b52613faba0123ae36d887855b06e053719deeff2739b94e0824dcbbff828646d13693"}]}}}, 0x3fc) syz_emit_vhci(&(0x7f0000000100)=@HCI_EVENT_PKT={0x4, @hci_ev_hardware_error={{0x10, 0x1}, {0x8}}}, 0x4) syz_emit_vhci(&(0x7f0000000000)=@HCI_SCODATA_PKT={0x3, {0xc8, 0xd1}, "d4d381bda28634773d6316d14a05741bccbb1bbbe496aa76550d20d9fd32934217b4c97ab9292b2b0cd79ad10342db52f37a61b9fea5d669b65114bab04fd33e3fe44c27d9709712affcef95553afbce5aad641299f880b2b265b797ec89e91767d6da78b036a66328ff25c6c62fee61916156730ad136e61cb5554701f39ce12c8b812cdb2f21a3089390cda64fc488051d6da648187de0e66881a70327bd4642bfc1dc8195d575f94f5b77e00db1eb644e4b248bd3bc52f7cc14c7d9ac080f6562a0c70666ee403d10ef945113a3dec5"}, 0xd5) 17:23:09 executing program 5: syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="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"/667], 0x102) syz_emit_vhci(&(0x7f0000000340)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x1, 0x1, 0xc}, @l2cap_cid_signaling={{}, [@l2cap_move_chan_cfm={{0x10, 0x6}, {0x80, 0x8001}}, @l2cap_cmd_rej_unk={{0x1, 0x3}, {0xb019}}, @l2cap_move_chan_cfm={{0x10, 0x8}, {0xffff, 0x8da8}}, @l2cap_conn_rsp={{0x3, 0x5}, {0x2, 0x1000, 0xfffa, 0x7fff}}, @l2cap_conf_rsp={{0x5, 0xfb}, {0x84, 0x7f, 0x9, [@l2cap_conf_rfc={0x4, 0x0, {0x2, 0x8, 0x6, 0x0, 0x8, 0x4ec}}, @l2cap_conf_flushto={0x2, 0x0, 0xfff7}, @l2cap_conf_mtu={0x1, 0x0, 0x161}, @l2cap_conf_mtu={0x1, 0x0, 0x40}, @l2cap_conf_rfc={0x4, 0x0, {0x3, 0x3, 0x81, 0x470, 0x6, 0x1}}, @l2cap_conf_mtu={0x1, 0x0, 0x7}, @l2cap_conf_ews={0x7, 0x0, 0x7}, @l2cap_conf_rfc={0x4, 0x0, {0x1, 0x0, 0x7, 0x2b4, 0x2, 0x8000}}]}}]}}, 0x11) syz_emit_vhci(&(0x7f0000000300)=@HCI_EVENT_PKT={0x4, @hci_ev_sniff_subrate={{0x2e, 0xb}, {0xc5, 0xc9, 0x7, 0x3c, 0x984, 0xff}}}, 0xe) syz_emit_vhci(&(0x7f00000002c0)=@HCI_EVENT_PKT={0x4, @hci_ev_simple_pair_complete={{0x36, 0x7}, {0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}}}}, 0xa) 17:23:09 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x22, 'root'}}, {@uid_gt}]}) 17:23:09 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) [ 3125.671143] Bluetooth: hci7: unexpected event 0x2f length: 1017 > 260 [ 3125.672358] Bluetooth: hci7: unexpected event 0x2f length: 1017 > 260 [ 3125.673492] Bluetooth: hci7: hardware error 0x08 17:23:09 executing program 5: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000000), 0x2c3, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100), 0xdb, 0x0, &(0x7f0000000180)="389e7627cc68324d4a4ce2426a2a25e26de5e25afc23da8d196cec275f4f3f77004e6e363b46221ea648ca4bb72854fc7d62d2bd45fa0dbfe197e153a28699096d93ea10d45934bfb3aabdc341e5bc249a45f4c0b1a7a600a96bf0bd9c0bf3bbc289e3a03b758e5000227199a6a1509231fa07baf32b30abff8988201d153fd534f1d45229a23ad2408fa275022201242041a645252462b228b6cc0983c3cf30b96a91ad04ee8c55f778a9e8973bac0c15e4d63fdd50dc04f56a44946efcfa040750d0b0b25f29140726264983b24d3fb2a763a87a27ade7a4459e"}) syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0xff}, {0x1, [{@none, 0x0, 0x0, "c30c5b", 0x0, 0x0, "db30ba492ae7cebc05283ff7316f6f210553ec196d4a18ecf5d01dc1bf997ef13579191093ad7c2097050b9b51724181ceacef3154a0e7263bc3589c93be7217c652e0837c4276244b75a00d7d152938e796920a4def61bae4095fb54159a062fd16816dc45c62affc0a91db419bbaeab0975ae432f34d200d365d0df346882e2c547258e57cab65b7477097aec25c74fd123058f55e16b6a37b2da87d7804ccb4c46e8c72ea562bc610c7c24a1d06577f0b55e43d6f6df8af0fd111dff06245bdbacef41a361bf59e6d1c39bd00d0e256fd63c4e234416496c3c3aae648f90660982ffc989e8bf6535c8c9f54dbf7c9"}]}}}, 0x102) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioprio_get$pid(0x1, r2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_bp={&(0x7f0000000040), 0x4}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r1, 0x9) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 3125.679318] Bluetooth: Wrong link type (-71) [ 3125.687245] loop1: detected capacity change from 0 to 40 [ 3125.795564] Bluetooth: hci1: unexpected event for opcode 0x043d [ 3127.735718] Bluetooth: hci7: Opcode 0x c03 failed: -110 17:23:20 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x25, 'root'}}, {@uid_gt}]}) 17:23:20 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:23:20 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f", 0x58, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:23:20 executing program 5: ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000000)={0x401, 0x100000001, 0x40}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000180)={'mangle\x00', 0x4, [{}, {}, {}, {}]}, 0x68) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_auth_complete={{0x6, 0x3}, {0xfa}}}, 0x6) syz_emit_vhci(&(0x7f0000000080)=ANY=[@ANYBLOB="03c900bf0e7fc55b4bf3dfa9b18ad2fa7aa9bf65ebf09a3053b055a78f28e353c8883ac5cf746eaf729a8f9f39ff90dbbbd1ed80ea592e47241ad6c3a73194d30a8a4140bb237adb8d09aad3a7a6bf39ca89ae122919c03ad9127eaeb96d35cd015b1b8005bfca64cd49ce09fd16a1a44624a6dcc697386e56737b8a052dfa17b90c961ecfbb4303e63fd265abd8a213a44138898d18fc6904775d33e4904e7f2700a3b44ff11b03f687ee8feb761263721384095ca6effeb739ec0000000000000000"], 0xc3) 17:23:20 executing program 6: syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="042f01008a2653d3c7d8c4c3db7b4d44375d52f18acc0ff821b59b893453dae6b67455634a42808dd6ecc3725dadfdf827819583079275880c2978078906546f227aef5e14dd0203582a18e57081ba71c9f89a68703220a3b110d779400e92de9d62b3e55f91ca313225475719"], 0x4) 17:23:20 executing program 7: syz_emit_vhci(&(0x7f0000000040)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x3, 0x3}, @l2cap_cid_le_signaling={{}, @l2cap_le_conn_rsp={{0x15, 0x80}, {0x2, 0x4, 0x100, 0x2, 0x3ff}}}}, 0x9) 17:23:20 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x0, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:23:20 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) [ 3136.906114] loop2: detected capacity change from 0 to 74 17:23:21 executing program 6: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_logical_link_complete={{0x45, 0x5}, {0x80, 0xc8, 0xc9, 0x98}}}, 0x8) 17:23:21 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x2c, 'root'}}, {@uid_gt}]}) 17:23:21 executing program 5: r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000180)=0x1c) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f00000001c0)={{0xa, 0x4e21, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}, 0x3}, {0xa, 0x4e21, 0x6, @private0, 0x9}, 0x6, [0x4fc, 0xffff68f3, 0x7ff, 0x3f, 0xfffffffb, 0x0, 0x100, 0x3]}, 0x5c) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='mounts\x00') setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@empty, @in=@multicast2, 0x4e20, 0x994, 0x4e22, 0x8, 0xa, 0x180, 0x20, 0x67}, {0x239, 0x81, 0x8, 0x4, 0xad22, 0x2, 0x7, 0x1}, {0x8, 0x0, 0x90, 0x400}, 0x0, 0x6e6bba, 0x1, 0x1, 0x0, 0x3}, {{@in=@local, 0x4d4, 0xf49056e861f897db}, 0x2, @in=@broadcast, 0x3506, 0x2, 0x7220f581369e88fa, 0xd1, 0x24, 0x80000000, 0x3}}, 0xe8) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x102) [ 3136.974083] Bluetooth: hci1: unexpected event for opcode 0x043d 17:23:21 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:23:21 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ioprio_get$pid(0x1, r1) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x9, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r1, 0x8, r0, 0x3) syz_emit_vhci(&(0x7f0000000000)=ANY=[], 0x9) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0xff, 0x0, 0x0, 0x0, 0x0, 0x80021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() ioprio_get$pid(0x1, r3) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)=0x0) pidfd_open(r4, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r3, 0x8, r2, 0x9) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x3, 0x0, 0x3f, 0xff, 0x0, 0x4000000000000008, 0x40020, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x400, 0x4f}, 0x1800, 0x7, 0x7, 0x4, 0x5, 0x10001, 0x8, 0x0, 0x3, 0x0, 0x1}, 0xffffffffffffffff, 0xc, r2, 0x0) 17:23:21 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f", 0x58, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:23:21 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840), 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) r5 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpid() ioprio_get$pid(0x1, r6) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r6, 0x8, r5, 0x9) fgetxattr(r5, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:23:21 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x0, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:23:21 executing program 6: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, '\x00', [{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, {0x800, 0x0, 0x80000000000}]}) r1 = fsmount(r0, 0x1, 0xa) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = getpid() ioprio_get$pid(0x1, r4) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r4, 0x8, r3, 0x9) sendmsg$unix(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000140)="112a8e45c90d42ca0a8dbb234241f7d9275b3a0c31c200310a73c8cf5d29af47375a9ed3c5630e9cfe74dd3d64754d904c2f4e5182f239c423f883d86f372c1251e464019b5a8c77fb9dff4519fd826df198e0b2505297c0f6b4557eb1f212136e79de03bc10f82601abefb41b89142d24b3a3de19835e143177880d871281f9841eae0c975a6defdf2b229e2eb9a4a01f320e23242771e3a3aed21266190a5def6cdbc5fe187b5a2af66c8d2a375f31d1dee1cdae58b1431e5413032987fba12a48124025252eec65fe5ad6224e9ff50f1bf9c31ab91515", 0xd8}, {&(0x7f0000000240)="d213ff92ff7530db28e4d3a77ea7023e75d73bd4622f17e4e610b6b0e2f4750257195620dbf4dcbb8a091597bb48f6dfbdc4bf207ad2b664a47602af459d1a7c4413e08dd4285ca7805be7534a3ee1c6df4e108665caa659d611bd726d6d4d1146964d8d", 0x64}, {&(0x7f00000002c0)="dc6c9189cf1e8a3ef829209c38a9f4336c6c0db4eb2140a7f3e8c088a732e46928da33472b03db2134b9f2ba791871a57138dfe518b560b17576b153273e56953a6629436539b785876d90068fb3d2a94b4bf09f5e9f49094873769364c171c823251d45b8a44cb31953761f06ac0898a53acf495a564c3e4a76cf236385d17edbce4bab27ae54ed053db7eeb52f35be87e1ee6fb56b50f82be979ab94242060bbe9a63d3fb2bb6861e80128ea99164e28f71ae8ec4685addf031d7b34c714b6b7a6b1df6d0320b3eed54fa09f68b528d736ec5428b451f78525ec7ba9f1a091b4b17c", 0xe3}, {&(0x7f00000003c0)="bf91a26de70643fb8703423146910b06e4d879653be39f6d3f3956e65b03608a4f9c20809e1956e6f65a2944c93e243d7d67a1290bf7754ad483783679507ef6aefbca3629b761cf8d1f76599c33793576a3f091e2a102b0721078379bee81162a3defd9ecfee4736da5e6bd59630888313a5ef6a4bd19e09737aae6a67d165a3c494f6270f9015559517b7377b505ae58a131ca4688327525e69c614ac7705c013bf366ffe4518839745df452a9c05925dcfa", 0xb3}, {&(0x7f0000000480)="e7394de4ca1f3b5b5e9597739759a21e4cb3562e83e0111720e3618d7ac8020b86d906f214260f9643163cf13b093b7dad06a5f68466ff6322", 0x39}], 0x5, &(0x7f0000000540)=[@rights={{0x14, 0x1, 0x1, [r3]}}], 0x18, 0x4}, 0x4000000) syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0x1}}}, 0x4) [ 3137.090433] Bluetooth: hci3: ISO packet for unknown connection handle 0 [ 3137.144333] Bluetooth: hci1: unexpected event for opcode 0x043d 17:23:21 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:23:21 executing program 7: syz_emit_vhci(&(0x7f0000000080)=ANY=[@ANYBLOB="2fd20434060000000025c80b7d1ce9afc644b46fa143b92811f459a812947b3d4b6b394fb19ce234e6cd20950c57ef7a45c453d913d3caaa1381856c77a694af81cf85522146"], 0x9) syz_emit_vhci(&(0x7f0000000000)=@HCI_ACLDATA_PKT={0x2, {0xc9, 0x3, 0x0, 0x24}, @l2cap_cid_le_signaling={{0x20}, @l2cap_ecred_conn_rsp={{0x18, 0x59, 0x1c}, {0xc0, 0x100, 0x24b1, 0xa06, [0xfff, 0x20, 0x3ff, 0x200, 0x3ff, 0xfffe, 0x5, 0x1, 0x69, 0xa9]}}}}, 0x29) 17:23:21 executing program 6: syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0x1}}}, 0x4) syz_emit_vhci(&(0x7f0000000000)=@HCI_SCODATA_PKT={0x3, {0xc8, 0x22}, "5a60012cfd1d50fac2469352981a5c3d27c39eb72bc06637261d8971cb6d923bc9d0"}, 0x26) 17:23:21 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}, 0x22}, {@uid_gt}]}) 17:23:21 executing program 5: syz_emit_vhci(&(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x102) syz_emit_vhci(&(0x7f0000000200)=@HCI_EVENT_PKT={0x4, @hci_ev_cmd_complete={{0xe, 0x4}, @HCI_OP_WRITE_VOICE_SETTING={{0x6}}}}, 0x7) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="c24101c8"], 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) syz_emit_vhci(&(0x7f0000000ac0)=@HCI_SCODATA_PKT={0x3, {0xc8, 0x1000}, "864ccd850db48279c2a1ee260efe90e72af0f0118f4a7d3a77c87bc806cd91604da1be3c65fbf7731b5df8b3758677a80898db8b2bf90807b40c56dffa0bfdc973aa9b8c23607369861ddf392609941f89613d1391132f57928e019450f8fa2ed15ef660eb70705cba1f38c62d998c346df3ca482dbd6287c514540a96503791d85db1905fd3b4e9e8ae45902edc5416feac25a8b2461b27455a41798b472d8c587071e475c2cbca52584e47ab83807d221e4962fe4ead4d696cc548c96025299f3407d515f712b494fffb3ef1906da18e42bb6b251af035b9d352b0b876e129c8eb6c9d1a5a63e4cfc5763bc8279a4c7814df090c81f26fadd8aeb3cbd633d9d5cd56a54f90e8dd048c90fd243be02818e9cae506560754a9713353ad22a7eb0a85a95a8f2f395a13a4e743b15ab5c66bc7aeec984b2fde1ee650e2d63f6c783339602a0a8bc91fac997b74c511c7e5c9ae09461186817011878401033303bde9451ea1703353897de6194421824b8433012cd389a348ca6e2ec25991fdff106ab6e73ac21b7505d92d568655097462f564dd5db3d73ecdd299e6be38d85252e1fecd2e7b63e9aa72a0be133aafbb112c65c04d470bafbdb733f8c01790cefe49b2718fbd14fab9375a8ae693544c3457b99730ce94a654a042a52c0a59adf4932e8e016bcebb3715c6111fc942506bf6d0b02cde84a40b43cc1dd252e76ef14ef5838e2347d5b6d64968fb562efc05971ba3c68de902b5d6059b3119d8608f15cbe6d79dc19eeb0196f3b2381f8f7f8d52fb3888b401bb0af85d474c56d117d7034965ed9ad722ff953af2de222114b4987da7294258d04953da0413b0e94e32973416fa93ff431200ae93ff941a2eadd957aeecee6eca52f9ae1f11b3e39925f23e92cf8016632767e238e008a607a946421333ca232a122f0c519252d2e80d90f001be2641c5ebb2d30cc8cdf8dcb41f115e42abbb7b3974350e0c34de8c6f23c6abbdb76769dcf0f92559a3c53cf213fa9e4c209bbfce8b652036cae625920849f703827e8e02e5d2d4095f70aba1b8d7414786f60091563f9d66f6cfa9dc67b526efaa4ef6639114c955d3649010985781ddd0943e229c91315b7b589b3a9ff0b9bea09e97b5d2438cc1877aefd2d1360bf28df758bf5346ab281948576bfaef1593eb98d0818134256ee6a2492cb70d55e7df0a85fbad4806c912fcf6e10a3ecc3711205d5dda50fe3ff3d90137fd7d3a6c02e7a9b545535bb6a77f24b35734e6dd2549816f393d607ac67a4e60d4ded6ddfe5e35497849b8774c81da4009704c9efdeacfc48da3d26259389c9617d702873f97524c70b3d63fcc8ae121d2c082929534386152b8569157b9118e9cf64f4e0582d6989f4a8b2258b430f2d94ebdbac12574ec2512ba2aab2ddb896f66fccf42505028e8a40bac5cb152aa6ee653a5303168a1506a7a4d2208fb0f9cb5fc319e67052a5b512b5924d2ae4382271595d78acc99ad822486a8b0af54d1cfbf4d65f43fd95aff4ee66e7b0d1e60d2a1daadc40c1ed1730fee79853e281b26ce9937f7db9d9f53860ddcd8f13faf45309dbc95e0ce63a89e35c518931185d1cbb539c6f762f80b6ad7a083eecc1dd51afc0beee93fa8f78c7a45260d76ae90bd9bdfe1537acc8189b64bde5152a93acb71b5205dca846a27db99613573bdb0998ff7ce33229e91b6834ba86b33cb2dd1958783a952fa03b36b59fa38bb7981ad70005f86321071c90974f0df04cc2ec6d06469a93d7ad72a93c95f5d7634ec8188ddec37a3f976a40cfc933b6c7a70252310073b02fbf46cd8a4386571bbcd29fe60ac6adcd65e76af2baf781ed64873b4990744f62480abcf1f60c4c23d20733531975858feceb9ef6ccd42b89ec8d342ccf3f724ac2e08ad561a1dc5f5a21a28d0ae56635e6eda06bd2262a6de421578e72d5a6db168a85a726de9899631220132fbb87d5f95041a8d615232023e8f6c54d07bc9a685cdf1518f55bf0329c7a7f363ae3d86541fa6c39d910866c423a933b062d5aef2f07059950a095fff21aa7b3a1c0b138b3339d78f4240b189e8aaaf542b0e739dd1aa5c4ddf68b0069ad47d3138eea656b95aea7ead8ff0605ed2b982cfc06f71eb9084c350b3e2a20bc52f9ab32187324f7715a3a067e7818b7f72adb1c447cbd9fe45992a52437cf865ba6254abb5d2343862855a38323d5fbe32990ebc942df0cd683d3d1415259678366f9fe340afa303844f529d10fbdb355aa5837e6ab8f8651d4857b11e9a9815931c1ce0c9b7db655ea8c48bac48474b5a384fa6cdd8bbfc0fb932fe5bda73b4e0ed58b6beddc2cd2c20b06bb1acc7fa8bff946600841badca3db62402c18cf56093aad5c8f46b3b6d5fadb692a503756c00827fb09643992b02c5ad2f355d5aa00f4d012835ffcd494bd4ba4f909dde405c0880b3b2c0f8516ba1c8117d3f2170a7b7241add74712d4b1afd3dcb02a6c26671e1e533d1ff80f8f55c1fadfb3eb30dfc9c41f928376ed516faedad13c0e58d65378baf0de8d84a165d188010824da6cf4f56fe4e25a6b0cdf680151280e864b54faf693d8d329a40d3b9dfad601eb9cb1f2e5e3664be47410943dbf6fbe2dfad19bb6a436d63e2c6878a9183b92292497df40fc5f5f959b5d12244bea81cce1f18d5368f7f9dc3197f58d547a8f7c41526044488e7ac87d80847ce8f0dbb24e37c3769ade12df0e2ee8c24e1f891e4579334b974887b0df654ecd50458e858b85604d1a1c1568a24a358acced424c263e0ee8b9d00bb8da9a3ef45ae4588fb7cff69d18f713a32d56beb7191d0d9f8d96715b7cd4d5aa49ea407a1e993f2ec705da9e7cfc501830b1d260573f60971a4f73505d9949c12005b2142562eee15e2aa8e316a81cc79df76fa0e578efb029878c2bee9e5781b8ac8e7002bc0d778b442ec28a8ab7286197dfc1be990b121525ca569c3280be02a303418b267e2ed793a901aeeba280ffa23ac4fa025959501354c0ae158100349ad091511f566d3569148cd0e0b8e24acf84e1aa9790a707ad5eb096ff204f8fc4cbcb89479410581aa53f412f024e99bed2edd47c57c5b07242bdb6d3131808ef2e9675a3c9e1562c24b2c1f91d0d2bf14ef85eb97750538810ddf3600691a16d1eca0f7280d746830b9aa87acbaed8c057e63f98e32e0b13add2b9ebb92eb9d8617b36c1dcf6e5fd9ec3165988b11c8a06594964a279dc2395214233c24af399dc32a7adff68cf0548e789e049762bf2f917e9df63e3c170bdf8efeb3cca1342e0797ed98ea03824b2b83b73b5019e39c4527229c678f9cce206199d6f68c835649ffc1acf72202388f77684420013d4add2f566574df89ba34b8525d903f0ae8d0bf1086b2facd8de45af2b9a22761622e19985e9b3523ad8f97f3b5bb5b1a2c0e609a92ddc0bf2a3e2896a18d45cbb52b6a18b2330c24b0088a59d03865f3dfc924d82aa52a75c38e6e48d013f70719846c207ccee79257d2112118eb85a3e159ad2d0865941d0db89d5ed4c3839a6fa73349efed229a6d744291343392f5d3d30d70b4b3165ce9a48a0dccab75da29abf9abfe022601939360b9e0a58165b57669ed7fa2dff3c60bf3d579c74952924a91fe9ea15a6cdfdf2b795a924006af7440c425f1ba3b80dd6eff39e5a20c20a09867c691c46a9703f8d012dfefbdeb3d2fbb1488d8ed45b6ef279b5901aaaa5cbcf6cb1d9b1a373e680c0456205d5e8c345e447b578918ec9e391fd670b504f7284e0b894a738f4ccd406ad52def496259da70d74f7810d53842653bd4d91647f8f14cb3301c65930151a282b77600ceded2fba0ac47b4cbf74582e033899f2e6a496ebfa75fc2cd70c659d45da4112f956286502579db25e01caf3c977ef2fc02273878e0690816279063ccc0cf57273cad8af46ecced628632b51ece8023b01bd3ed10ba3b87c511bb3e4c3a67c3900535491364e94cbfb3f28ab26496553a62006285da6101a641f33f94de1b3f3341b90b13098b268967d733481e4584126dcef706a3f518ac7b2a9225832824d30cb63734f09e57c968905c23a790237fd479e2b24a123f5ad92c4b4a929e6dd4d69bed570ef0a8b0dd6da3671650eedd2a2a9c81936269a6eb5206c00a9ebc9ce4c0390e0b959e1303089084b8c9357084f541ff731e99716f0e38f2bf2b221609a4e86fb669acdcfc4571a3bf01542f244347da2a677b6d1d54d5c1ea1b595f3ef1fb698c34441cc02a698136bfd22ac7f4fdbc73d308721895d80b57c38d53969404f8380aa731adc81ea99876fbc240eee097191fd478bb576b1b11ae4a4889457918857ec9f60de2cf355453ec30b1820431a6bbbb5ee0ccdd105645ef02676a66f7a2e8199f0515b7c22e4dc3737c31a62dad7700681a9c0ac63df119928322810d628c9aa3b948d507ffacd41d7e0bb85e358332b7834836dd895d068d6c541cc1a5111d323053f4959d25e8ffd3753d47c4edd0d32937ffe46dc6c42ea14f1b57bc143fd8a62537a8cd2b3e5503aa52fd79a39997e316e88042a307642b997e1aedb9d588980a68399c6a87df0cd4c28389eda715e9019c92011e8e888d69bf9e6442541aa63c2b4576ee1282ad4a7a45dc1c80115d2bff96717f222c0438cb4d3583a840b57ed1ade46d0b8544e34835159e9ea982504bd51f9844d9943b8e8ddeceeaccbd3d379ea4b1dcb491f8052077474b39bd67b72dda6582829338d22aaa81e19b7a9008758f4841f229a0e34761abfe402f69e277928575ff20072515fa9bd9879bd0bad94661a2356671323c48ea51ac5ff794106fc23dda53c81e1d478242e5a90dfb9a74de97698ecfd9f622a7b75f266fe7d2b1dc582ab8de8846d2ea7637aa5d7f1e29f2d832fd9956bf4cd5c0bb02384abad1f1fe4b0c3bdf429cd06c022840398f106522dcde0e4bc92c2c14aeb5e454fbd80a3f5e7af92cd173329e84828c68b3e3effcb8b22aeb5201cde83f6cadfd36e4338af643e65886db7b2f841aeeafb760a6f0a62246383f6ccef4184fed7191d80784152a2c52fe9fc17b9aeff4f40bd773c7691ddb15b9f45a3b082092ff22b9fe101ba68c619254bc640c6426e8eeedad904a7691f445fdb3f4f931539c5f391c9bd8862e981c5209dcac094d127aee8e47b5ed019e3e35cf1394de06ebcb8790a92c7bdf89b8ba12e15f8e2e2de9635bf3ee5c58fac4d902e023b1871d51e064e0ffd3f4c67cde3b46bd75dd321620744fd55b5f0c36bed25391d4b523bd1043845c547fa7b84be6787a03d8404967a50f7d56c49914c5ce88ef4b5e1ec2ed17f28f31facff1da4a5f4402a979f220c00912d4b741f0bf4306c7bc8270d579a71e9d08ce81a76640a68f64a456ca6122888ea195e4d2297512139a036ef15b680a1c40a16125f941568c22b7270efb60e690e9edb0dcec46d7649b8c87f52966fc55d3dd7a79fb4874e2444cd87610cc80bd6521d13dafd4cec13763bd596e10d9958241df2ac8a6f4a978030080cd44a1e0bbce64aebaf0b25ffc542332123268dcf07c8e7d0d1f9bd0d216a48f7d63453b2580ff0100064c9ec6465c074ee6de86272f82a546ba9e5bb4bafcac9a22560a9fb63c2727dd7b76265755c59b957370dc817507d19759ee618e8e691fb278ebcd87bbf0a39d92d77298e8af0ca47f634675e2e09708b432fd46f992a08480805e0af0f29892aa85b4e97c2bce79ebc2f15dfe13db367bb1243ba09ac752da1b375e8dcd7d27fca9c8af5f28bc5f"}, 0x1004) [ 3137.229178] Bluetooth: hci4: unexpected event for opcode 0x0c26 [ 3137.233421] SELinux: security_context_str_to_sid (rootuid>00000000000000000000,) failed with errno=-22 [ 3137.238119] Bluetooth: hci4: unexpected event for opcode 0x0c26 17:23:21 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840), 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) r5 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpid() ioprio_get$pid(0x1, r6) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r6, 0x8, r5, 0x9) fgetxattr(r5, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:23:21 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x0, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) [ 3137.292576] loop1: detected capacity change from 0 to 40 [ 3137.362238] Bluetooth: hci1: unexpected event for opcode 0x043d 17:23:32 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840), 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) r5 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpid() ioprio_get$pid(0x1, r6) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r6, 0x8, r5, 0x9) fgetxattr(r5, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:23:32 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:23:32 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41", 0x84, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:23:32 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x0, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:23:32 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, '\x00', [{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, {0x800, 0x0, 0x80000000000}]}) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000040)={0x2, 0x6, 0x4, 0x5, 0x11, "72ac5afd6cf45e13"}) syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_encrypt_change={{0x8, 0x4}, {0x8, 0xc9, 0x2}}}, 0x7) 17:23:32 executing program 7: syz_emit_vhci(&(0x7f0000000000)=@HCI_SCODATA_PKT={0x3, {0xc8, 0x1a}, "aaae8056b190e2a46631a62e1c118c74a20942e573fad8dd502e"}, 0x1e) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_disconn_logical_link_complete={{0x46, 0x4}, {0x7, 0xc8, 0x8}}}, 0x7) 17:23:32 executing program 5: syz_emit_vhci(&(0x7f0000000980)=ANY=[@ANYBLOB="0000a6"], 0x4) syz_emit_vhci(&(0x7f0000000000)=@HCI_SCODATA_PKT={0x3, {0x0, 0xf5}, "4c5a15fac9dff3ca5640760284fd2106a0814c0b0093dcbc403abbe3772b66b91a97d9f6818353752586cf2dde501f63e6009c9f1e4e4622fe93bce62fc74f6647f8b1dd4cae2f9ade17d9b4f6a1008108f8c6ceccddc45963959d4f2a86c299729680954a0d76e3fa7c45d8b151f2b5ea69d3c1224d9318cc067d67145188dc62d9b81203c4287d006696bced74ec85e60ce4df322a64598990d122cbf2f3eb1ed876870b7bf79d3de07a8d4f49e0fcbff78f396fe343b9bceab94a479a272edbe68962a22f6f62327f31cb4c2a6c083c48492a0d4be40d99c4c2288b2749138209a35a8f74b396f7463e264de42bd3afd0e87a6a"}, 0xf9) 17:23:32 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt, 0x22}]}) [ 3148.645965] Bluetooth: hci1: unexpected event for opcode 0x043d 17:23:32 executing program 6: syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0x1}}}, 0x4) syz_emit_vhci(&(0x7f0000000000)=@HCI_ACLDATA_PKT={0x2, {0xc9, 0x3, 0x3, 0xc}, @l2cap_cid_le_signaling={{0x8}, @l2cap_disconn_req={{0x6, 0x18, 0x4}, {0x5, 0x1}}}}, 0x11) [ 3148.664319] Bluetooth: hci4: SCO packet for unknown connection handle 0 [ 3148.675577] SELinux: security_context_str_to_sid (root) failed with errno=-22 17:23:32 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840), 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) r5 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpid() ioprio_get$pid(0x1, r6) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r6, 0x8, r5, 0x9) fgetxattr(r5, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:23:32 executing program 5: ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000000)={'vlan1\x00', 0x7f}) syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0xff}, {0x1, [{@none, 0x0, 0x0, "c30c5b", 0x0, 0x0, "db30ba492ae7cebc05283ff7316f6f210553ec196d4a18ecf5d01dc1bf997ef13579191093ad7c2097050b9b51724181ceacef3154a0e7263bc3589c93be7217c652e0837c4276244b75a00d7d152938e796920a4def61bae4095fb54159a062fd16816dc45c62affc0a91db419bbaeab0975ae432f34d200d365d0df346882e2c547258e57cab65b7477097aec25c74fd123058f55e16b6a37b2da87d7804ccb4c46e8c72ea562bc610c7c24a1d06577f0b55e43d6f6df8af0fd111dff06245bdbacef41a361bf59e6d1c39bd00d0e256fd63c4e234416496c3c3aae648f90660982ffc989e8bf6535c8c9f54dbf7c9"}]}}}, 0x102) [ 3148.763202] Bluetooth: hci1: unexpected event for opcode 0x043d [ 3148.774858] loop0: detected capacity change from 0 to 74 17:23:44 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x0, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:23:44 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:23:44 executing program 7: syz_emit_vhci(&(0x7f0000001080)=@HCI_SCODATA_PKT={0x3, {0xc8, 0x10cd}, "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"}, 0x10d1) 17:23:44 executing program 5: syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0xff}, {0x1, [{@none, 0x0, 0x0, "c30c5b", 0x0, 0x0, "db30ba492ae7cebc05283ff7316f6f210553ec196d4a18ecf5d01dc1bf997ef13579191093ad7c2097050b9b51724181ceacef3154a0e7263bc3589c93be7217c652e0837c4276244b75a00d7d152938e796920a4def61bae4095fb54159a062fd16816dc45c62affc0a91db419bbaeab0975ae432f34d200d365d0df346882e2c547258e57cab65b7477097aec25c74fd123058f55e16b6a37b2da87d7804ccb4c46e8c72ea562bc610c7c24a1d06577f0b55e43d6f6df8af0fd111dff06245bdbacef41a361bf59e6d1c39bd00d0e256fd63c4e234416496c3c3aae648f90660982ffc989e8bf6535c8c9f54dbf7c9"}]}}}, 0x102) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_simple_pair_complete={{0x36, 0x7}, {0x5}}}, 0xa) syz_emit_vhci(&(0x7f0000000000)=@HCI_ACLDATA_PKT={0x2, {0xc9, 0x1, 0x1, 0x2c}, @l2cap_cid_signaling={{0x28}, [@l2cap_move_chan_req={{0xe, 0x4, 0x3}, {0x3, 0x3}}, @l2cap_disconn_rsp={{0x7, 0x5, 0x4}, {0x2, 0x20}}, @l2cap_create_chan_req={{0xc, 0x0, 0x5}, {0x9, 0x6, 0x7f}}, @l2cap_disconn_req={{0x6, 0xf6, 0x4}, {0x6, 0x7}}, @l2cap_disconn_req={{0x6, 0x7f, 0x4}, {0x800, 0x20}}]}}, 0x31) 17:23:44 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41", 0x84, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:23:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) 17:23:44 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840), 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) r5 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpid() ioprio_get$pid(0x1, r6) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r6, 0x8, r5, 0x9) fgetxattr(r5, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:23:44 executing program 6: syz_emit_vhci(&(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x4) [ 3160.109581] loop1: detected capacity change from 0 to 40 [ 3160.113880] SELinux: security_context_str_to_sid (root) failed with errno=-22 17:23:44 executing program 5: syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0xff}, {0x0, [{@none, 0x4, 0x0, "c30c5b", 0x0, 0x0, "db30ba492ae7cebc05283ff7316f6f210553ec196d4a18ecf5d01dc1bf997ef13579191093ad7c2097050b9b51724181ceacef3154a0e7263bc3589c93be7217c652e0837c4276244b75a00d7d152938e796920a4def61bae4095fb54159a062fd16816dc45c62affc0a91db419bbaeab0975ae432f34d200d365d0df346882e2c547258e57cab65b7477097aec25c74fd123058f55e16b6a37b2da87d7804ccb4c46e8c72ea562bc610c7c24a1d06577f0b55e43d6f6df8af0fd111dff06245bdbacef41a361bf59e6d1c39bd00d0e256fd63c4e234416496c3c3aae648f90660982ffc989e8bf6535c8c9f54dbf7c9"}]}}}, 0x102) syz_emit_vhci(&(0x7f0000000000)=@HCI_ACLDATA_PKT={0x2, {0xc9, 0x1, 0x1, 0x12}, @l2cap_cid_le_signaling={{0xe}, @l2cap_ecred_reconf_req={{0x19, 0x1, 0xa}, {0x7, 0xca66, [0x1, 0x3f, 0xc3]}}}}, 0x17) 17:23:44 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, '\x00', [{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, {0x800, 0x0, 0x80000000000}]}) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100)=0xffffffffffffffff, 0x4) syz_emit_vhci(&(0x7f0000000000)=@HCI_SCODATA_PKT={0x3, {0xc9, 0xfffffffffffffedd}, "d73edce1c1d0fadab3a974ac0783163ea5c762ed22bd7d9f086519e75596989aa16c215cfd317e45cd72e3646f675e827dd7b5671c585c2322a6227cdc90f37f76657cc8eb1bbef0720bfc089d6366facdbf9d898685a3a5015a4daf62d6931658d45d617594295b90706088a4548d4f13121dc6407d23a7bb0891f5cf3056d852c30a9cd800b4bb59c1f845430137eb5415257230a6859676b3f1859cb10a9de8fa11414c36171905dde57de046dd526441fb17c70a6cb603d6f4d541196b03479f7f739dbd51db5b253a471f0d91eb9ca73ff87cbd48e0f573b869157ed91cb391a4a2e17db400000021f7da1c5359af0992442d4e3bcc16"}, 0xee) 17:23:44 executing program 6: syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0x1}}}, 0x4) syz_emit_vhci(&(0x7f0000000000)=@HCI_ACLDATA_PKT={0x2, {0xc9, 0x3, 0x2, 0x12}, @l2cap_cid_le_signaling={{0xe}, @l2cap_le_conn_req={{0x14, 0x85, 0xa}, {0x9, 0xba, 0xae7d, 0x400, 0x200}}}}, 0x5) 17:23:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}], 0x2}) 17:23:44 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41", 0x84, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) [ 3160.272862] Bluetooth: hci1: unexpected event for opcode 0x043d [ 3160.329561] SELinux: security_context_str_to_sid (root) failed with errno=-22 17:23:44 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x41) syz_emit_vhci(&(0x7f0000000100)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x3, 0x1, 0x12a}, @l2cap_cid_signaling={{0x126}, [@l2cap_move_chan_req={{0xe, 0x8a, 0x3}, {0x5, 0x9}}, @l2cap_disconn_req={{0x6, 0x6, 0x4}, {0x6, 0x9}}, @l2cap_conn_rsp={{0x3, 0x2, 0x8}, {0x4, 0x1, 0x3, 0x7ff2}}, @l2cap_info_rsp={{0xb, 0x8, 0x47}, {0x2, 0x3, "bafad02d18577b001942aa2bd30b62faeaa63144ed6f31da7d76e6224ac6dc99af84b326ea03365b8465ee034fdb3cdf913a99f409248b3059811a4ee9001e3cfa1cc2"}}, @l2cap_move_chan_req={{0xe, 0x3f, 0x3}, {0x7d, 0x3}}, @l2cap_move_chan_cfm={{0x10, 0x3f, 0x4}, {0x9, 0x1}}, @l2cap_move_chan_rsp={{0xf, 0x58, 0x4}, {0x80, 0x6}}, @l2cap_info_rsp={{0xb, 0x5, 0xa5}, {0x0, 0x7fff, "724e04982ecae7ce3440e62dee87fcb5f869866d6bff7c1b4f50a6bb747c17b1d346ea3edcd9204cab6ee5b99b4beb2c91b9ea88af97fcfae1c7b9f53b60730b0652335e6787f1634f635198f77c3de76c44e32034a7804219492a1bb6d67a2907c8dd789acf327b286c39bfa01655b0a7c054c34945c9d10f05a0bb4f8bb28701ca4ea8094dc9b5cc2a126f516c202095ffd4e053255f00c91e29c595ea60a648"}}]}}, 0x12f) syz_emit_vhci(&(0x7f0000000000)=@HCI_SCODATA_PKT={0x3, {0xc8}}, 0x4) syz_emit_vhci(&(0x7f0000000080)=@HCI_ACLDATA_PKT={0x2, {0xc9, 0x1, 0x0, 0x54}, @l2cap_cid_signaling={{0x50}, [@l2cap_conf_rsp={{0x5, 0xef, 0x4c}, {0x5, 0x7f, 0x3, [@l2cap_conf_mtu={0x1, 0x2, 0x1}, @l2cap_conf_ews={0x7, 0x2, 0xc091}, @l2cap_conf_ews={0x7, 0x2, 0x8}, @l2cap_conf_efs={0x6, 0x10, {0x3, 0x1, 0xfbca, 0x200, 0x1, 0x4}}, @l2cap_conf_mtu={0x1, 0x2, 0x7f}, @l2cap_conf_efs={0x6, 0x10, {0x3, 0x1, 0x1, 0x6, 0x1f, 0xffff49cd}}, @l2cap_conf_efs={0x6, 0x10, {0x9, 0x0, 0xfe01, 0x8, 0x100, 0x8}}]}}]}}, 0x59) 17:23:44 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840), 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}]}) r5 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpid() ioprio_get$pid(0x1, r6) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r6, 0x8, r5, 0x9) fgetxattr(r5, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:23:44 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x0, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:23:44 executing program 7: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="043406000000100000e3119069ac3b32978b3bfbfed31dffff4e1a77ac7d5e41c65da7300a808e4730adbf5fc4"], 0x9) 17:23:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}], 0x3}) [ 3160.461949] Bluetooth: Unexpected continuation frame (len 84) [ 3160.552805] SELinux: security_context_str_to_sid (root) failed with errno=-22 [ 3160.592547] Bluetooth: hci1: unexpected event for opcode 0x043d 17:23:56 executing program 6: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0x1}}}, 0x4) 17:23:56 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:23:56 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:23:56 executing program 5: syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @hci_ev_sync_conn_complete={{0x2c, 0x11}, {0x6, 0xc8, @any, 0x2, 0x9, 0x1a, 0x79, 0x101, 0x1f}}}, 0x14) syz_emit_vhci(&(0x7f0000000000)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x3, 0x1, 0x48}, @l2cap_cid_signaling={{0x44}, [@l2cap_conn_rsp={{0x3, 0x0, 0x8}, {0x1f, 0x4000, 0x1, 0x80}}, @l2cap_create_chan_req={{0xc, 0x1, 0x5}, {0x76c, 0x1, 0x6}}, @l2cap_conn_rsp={{0x3, 0x7, 0x8}, {0x4, 0xfffa, 0x1ff, 0x2}}, @l2cap_conf_rsp={{0x5, 0x20, 0x16}, {0xfff, 0x5, 0x425, [@l2cap_conf_mtu={0x1, 0x2, 0x9}, @l2cap_conf_flushto={0x2, 0x2, 0x39c}, @l2cap_conf_ews={0x7, 0x2}, @l2cap_conf_flushto={0x2, 0x2, 0x2}]}}, @l2cap_create_chan_req={{0xc, 0x7f, 0x5}, {0x8000, 0x100, 0xb5}}]}}, 0x4d) 17:23:56 executing program 7: syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="92e7b13ee98b0d3200"], 0x9) 17:23:56 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:23:56 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30", 0x9a, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:23:56 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}], 0x4}) [ 3172.186943] SELinux: security_context_str_to_sid (root) failed with errno=-22 17:23:56 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}], 0x5}) 17:23:56 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ioprio_get$pid(0x1, r1) r2 = perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r1, 0x8, r0, 0x9) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = getpid() ioprio_get$pid(0x1, r4) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r4, 0x8, r3, 0x9) r5 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getpid() ioprio_get$pid(0x1, r6) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r6, 0x8, r5, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x2, 0x6, 0x2, 0x20, 0x0, 0x1, 0x42000, 0x7, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000100), 0xb}, 0x2082, 0x7, 0x7fffffff, 0x5, 0x3f, 0x4, 0x3, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0xb, r5, 0xb) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYRESDEC=r1, @ANYRESOCT=r4, @ANYRES32], 0x4) 17:23:56 executing program 7: syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_user_passkey_req={{0x34, 0xfffffffffffffe78}}}, 0x9) 17:23:56 executing program 5: syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0xff}, {0x1, [{@none, 0x0, 0x0, "c30c5b", 0x0, 0x0, "db30ba492ae7cebc05283ff7316f6f210553ec196d4a18ecf5d01dc1bf997ef13579191093ad7c2097050b9b51724181ceacef3154a0e7263bc3589c93be7217c652e0837c4276244b75a00d7d152938e796920a4def61bae4095fb54159a062fd16816dc45c62affc0a91db419bbaeab0975ae432f34d200d365d0df346882e2c547258e57cab65b7477097aec25c74fd123058f55e16b6a37b2da87d7804ccb4c46e8c72ea562bc610c7c24a1d06577f0b55e43d6f6df8af0fd111dff06245bdbacef41a361bf59e6d1c39bd00d0e256fd63c4e234416496c3c3aae648f90660982ffc989e8bf6535c8c9f54dbf7c9"}]}}}, 0x102) syz_emit_vhci(&(0x7f0000000000)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x1, 0x1, 0x10}, @l2cap_cid_le_signaling={{0xc}, @l2cap_conn_param_update_req={{0x12, 0x5, 0x8}, {0x7, 0x2, 0x3, 0x7}}}}, 0x15) syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_name={{0x7, 0xff}, {0x7, @none, "8128a5e6aed05c539bf7d201b1e752944839ba08c88b42c9f6f0757859bd3cba76f4e97db8d8b63e0d79d4a46c76c274d8d97cc6d93ec2f17cf7f24dbd77c3aff3071d34e5ae9c09359d326b58b0e83b4a5d225b809773dfecbea74c78394b98814c50ec2bfb707605efeb5176989627ce2b1e4df27edf6fdc01b84ab372993ef36e57596246c67a645969bbd71b5869146977a03d7aae3fe6255db53b4659fd9b8f761f9f20a4f91da267c5e3ba4b54aa916fe426fb9367c6e8fb74e39b1fc6ac730d8ec045bcba9ee3064f5ccbc40e7f6dbf820ec3dafcaaefee34a13751cf2bfbc989c8c255c0692f948adf20e1889d64d78a9e746dcb"}}}, 0x102) [ 3172.329227] Bluetooth: hci1: unexpected event for opcode 0x043d [ 3172.355206] SELinux: security_context_str_to_sid (root) failed with errno=-22 17:23:56 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) [ 3172.472049] loop1: detected capacity change from 0 to 40 [ 3172.501288] Bluetooth: hci1: unexpected event for opcode 0x043d 17:24:07 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}], 0x6}) 17:24:07 executing program 5: syz_emit_vhci(&(0x7f0000000140)=@HCI_EVENT_PKT={0x4, @inquiry_info_with_rssi_and_pscan_mode={{0x22, 0x10}, {0x1, [{@none, 0x0, 0xeb, 0x20, "eaa935", 0x3, 0x40}]}}}, 0x13) syz_emit_vhci(&(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) syz_emit_vhci(&(0x7f0000000040)=@HCI_SCODATA_PKT={0x3, {0xb73a308961925c48, 0x92}, "a4a67e2e8907ad23b784f5cf7b79ceb37fddc57fb7a164f5774573abdc68c5b5fbbe77d4986b156d27b8e3d402871b2975f5f66b013018606ca3808eef83ae8f5c7e5f946e952a66461706d05b4128a84cc988a45d42aca029a23d1b326345b8ceda1d90f8c1851d4c93ee8e1ec5d500f4a6298f22403fd9608491149d9e5c79c75f69c65b702bf1f91bce4b0ffceb28ce93"}, 0x96) syz_emit_vhci(&(0x7f0000000180)=ANY=[@ANYBLOB="03c80086ac3a4d5ab88fb7cda791a6cde423813cce9beb4b7f00903250bb066fb25d67becbfb387779f45dd33f35a8eaa39f3cf1e08ab3d807fc3466e5d15ff74cb429bd37b72f46f2362fdcc2124eb35d7e2fac0f5dd035665ec7b344dda11862167aba43ae0a3c787b5f55f14be3ab4600b04d9fc3dfba5f5af3856e63160f104d86b4ed01db2286e5aad0181c10bf978fb4"], 0x8a) syz_emit_vhci(&(0x7f0000000100)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x2, 0x2, 0xc}, @l2cap_cid_le_signaling={{0x8}, @l2cap_disconn_req={{0x6, 0x1, 0x4}, {0x9, 0x6}}}}, 0x11) 17:24:07 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:24:07 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:24:07 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:24:07 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30", 0x9a, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:24:07 executing program 6: syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0x1}}}, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) syz_emit_vhci(&(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) 17:24:07 executing program 7: syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_auth_complete={{0x6, 0x3}, {0x80, 0xc9}}}, 0x6) [ 3183.764258] loop1: detected capacity change from 0 to 40 [ 3183.770274] SELinux: security_context_str_to_sid (root) failed with errno=-22 [ 3183.782390] Bluetooth: hci1: unexpected event for opcode 0x043d [ 3183.807936] Bluetooth: hci4: SCO packet for unknown connection handle 3144 17:24:07 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:24:07 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}], 0x7}) 17:24:07 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/i2c_i801', 0x0, 0x40) write$rfkill(r0, &(0x7f0000000080), 0x8) syz_emit_vhci(&(0x7f0000000180)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x2, 0x0, 0x11d}, @l2cap_cid_signaling={{0x119}, [@l2cap_disconn_rsp={{0x7, 0x4f, 0x4}, {0x2, 0x288e}}, @l2cap_info_rsp={{0xb, 0x1, 0xf0}, {0x81, 0xf68b, "f5fba378731cace79acbd006a4257d678bde72a00cf6985d62bb5c146a4b5283b8009171cb7d4b332c443a02a0eca29fa0fdea0e43cc1e9cccfb89c9d18268cfbee5238ce7e9696d623e23197149af13690ef94ca878b28c0c415d8242688c55a1a9801516ceee86bcc7f65c3c79126c6150e82248d9e05346ac7332218913c5fba390b3828415db8b489ffcb4e149d7dc1b76f666a28b47bebdc7c804803058c72db470b708ab203fb25ffb1098ce0baecf9782c6536854deeece81bcee1ff6ce624e4299fdeaac83a7d2f12672067e2df8343aed01b5b22e5582bfe8ced235bbb5df226f198d8c048eee96"}}, @l2cap_info_req={{0xa, 0x18, 0x2}, {0x20}}, @l2cap_move_chan_cfm={{0x10, 0x5, 0x4}, {0xffff, 0x401}}, @l2cap_conn_req={{0x2, 0x2, 0x4}, {0x64, 0x3ff}}, @l2cap_move_chan_req={{0xe, 0x6, 0x3}, {0x7fff, 0x9}}]}}, 0x122) 17:24:07 executing program 7: syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @hci_ev_encrypt_change={{0x8, 0x4}, {0x9, 0xc9, 0x20}}}, 0x7) syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_role_change={{0x12, 0x8}, {0x2, @none, 0x29}}}, 0xb) 17:24:08 executing program 6: ioctl$CDROMSETSPINDOWN(0xffffffffffffffff, 0x531e, &(0x7f0000000000)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x400) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04afd8f539a1efb926979f6765bf8e0120"], 0x4) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) [ 3183.821048] Bluetooth: hci4: SCO packet for unknown connection handle 3144 [ 3183.912586] SELinux: security_context_str_to_sid (root) failed with errno=-22 17:24:08 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30", 0x9a, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) [ 3183.951564] Bluetooth: Wrong link type (-22) [ 3183.952430] Bluetooth: hci4: link tx timeout [ 3183.953361] Bluetooth: hci4: killing stalled connection 11:aa:aa:aa:aa:aa [ 3183.954476] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:580 [ 3183.955652] in_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 14275, name: kworker/u5:2 [ 3183.956818] preempt_count: 0, expected: 0 [ 3183.957373] RCU nest depth: 1, expected: 0 [ 3183.957971] 3 locks held by kworker/u5:2/14275: [ 3183.958643] #0: ffff888017433938 ((wq_completion)hci4#2){+.+.}-{0:0}, at: process_one_work+0x99d/0x1770 [ 3183.960023] #1: ffff888040ef7d90 ((work_completion)(&hdev->tx_work)){+.+.}-{0:0}, at: process_one_work+0x9d0/0x1770 [ 3183.961524] #2: ffffffff8560b740 (rcu_read_lock){....}-{1:2}, at: __check_timeout+0x171/0x480 [ 3183.962821] CPU: 0 PID: 14275 Comm: kworker/u5:2 Not tainted 6.5.0-rc1-next-20230712 #1 [ 3183.963885] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3183.964969] Workqueue: hci4 hci_tx_work [ 3183.965814] Call Trace: [ 3183.969655] [ 3183.969986] dump_stack_lvl+0xc1/0xf0 [ 3183.970578] __might_resched+0x2f9/0x510 [ 3183.971179] ? tick_nohz_tick_stopped+0x11/0x50 [ 3183.971869] __mutex_lock+0x9e/0x1a30 [ 3183.972423] ? irq_work_queue+0x2d/0x80 [ 3183.973019] ? __wake_up_klogd.part.0+0x5d/0xa0 [ 3183.973683] ? vprintk_emit+0x125/0x560 [ 3183.974270] ? hci_cmd_sync_submit+0x3b/0x2d0 [ 3183.974936] ? __pfx___mutex_lock+0x10/0x10 [ 3183.975566] ? vprintk+0x90/0xa0 [ 3183.976074] ? _printk+0xbf/0x100 [ 3183.976580] ? __pfx__printk+0x10/0x10 [ 3183.977162] ? __pfx_abort_conn_sync+0x10/0x10 [ 3183.977821] hci_cmd_sync_submit+0x3b/0x2d0 [ 3183.978461] ? __pfx_abort_conn_sync+0x10/0x10 [ 3183.979134] hci_cmd_sync_queue+0x7b/0xb0 [ 3183.979762] hci_disconnect+0x1c2/0x450 [ 3183.980335] ? __pfx_hci_disconnect+0x10/0x10 [ 3183.980968] ? __pfx_lock_release+0x10/0x10 [ 3183.981574] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 3183.982324] __check_timeout+0x2cc/0x480 [ 3183.982915] hci_tx_work+0x7cb/0x1a70 [ 3183.983468] ? pwq_activate_inactive_work+0x298/0x550 [ 3183.984190] ? __pfx_hci_tx_work+0x10/0x10 [ 3183.984803] process_one_work+0xabf/0x1770 [ 3183.985417] ? __pfx_lock_acquire+0x10/0x10 [ 3183.986031] ? __pfx_process_one_work+0x10/0x10 [ 3183.986727] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 3183.987402] worker_thread+0x64f/0x12a0 [ 3183.987996] ? __pfx_worker_thread+0x10/0x10 [ 3183.988632] kthread+0x33f/0x440 [ 3183.989123] ? __pfx_kthread+0x10/0x10 [ 3183.989686] ret_from_fork+0x2f/0x70 [ 3183.990245] ? __pfx_kthread+0x10/0x10 [ 3183.990803] ret_from_fork_asm+0x1b/0x30 [ 3183.991384] RIP: 0000:0x0 [ 3183.991787] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [ 3183.992675] RSP: 0000:0000000000000000 EFLAGS: 00000000 ORIG_RAX: 0000000000000000 [ 3183.993703] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 3183.994674] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 3183.995633] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3183.996595] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3183.997543] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 3183.998550] [ 3184.002690] [ 3184.002956] ============================= [ 3184.003508] [ BUG: Invalid wait context ] [ 3184.004059] 6.5.0-rc1-next-20230712 #1 Tainted: G W [ 3184.004893] ----------------------------- [ 3184.005445] kworker/u5:2/14275 is trying to lock: [ 3184.006075] ffff8880204149b0 (&hdev->unregister_lock){+.+.}-{3:3}, at: hci_cmd_sync_submit+0x3b/0x2d0 [ 3184.007319] other info that might help us debug this: [ 3184.007973] context-{4:4} [ 3184.008337] 3 locks held by kworker/u5:2/14275: [ 3184.008945] #0: ffff888017433938 ((wq_completion)hci4#2){+.+.}-{0:0}, at: process_one_work+0x99d/0x1770 [ 3184.010227] #1: ffff888040ef7d90 ((work_completion)(&hdev->tx_work)){+.+.}-{0:0}, at: process_one_work+0x9d0/0x1770 [ 3184.011617] #2: ffffffff8560b740 (rcu_read_lock){....}-{1:2}, at: __check_timeout+0x171/0x480 [ 3184.012778] stack backtrace: [ 3184.013172] CPU: 0 PID: 14275 Comm: kworker/u5:2 Tainted: G W 6.5.0-rc1-next-20230712 #1 [ 3184.014370] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3184.015410] Workqueue: hci4 hci_tx_work [ 3184.015942] Call Trace: [ 3184.016285] [ 3184.016591] dump_stack_lvl+0x91/0xf0 [ 3184.017120] __lock_acquire+0x1605/0x6340 [ 3184.017679] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 3184.018364] ? __pfx___lock_acquire+0x10/0x10 [ 3184.018963] ? finish_task_switch.isra.0+0x203/0x830 [ 3184.019650] ? __switch_to+0x5c6/0xeb0 [ 3184.020163] ? __schedule+0x9b1/0x2b00 [ 3184.020682] lock_acquire+0x19a/0x4c0 [ 3184.021182] ? hci_cmd_sync_submit+0x3b/0x2d0 [ 3184.021789] ? __pfx_lock_acquire+0x10/0x10 [ 3184.022375] ? dump_stack_lvl+0xda/0xf0 [ 3184.022692] Bluetooth: hci1: unexpected event for opcode 0x043d [ 3184.022909] ? dump_stack_lvl+0xdc/0xf0 [ 3184.023879] __mutex_lock+0x12a/0x1a30 [ 3184.024406] ? hci_cmd_sync_submit+0x3b/0x2d0 [ 3184.025007] ? irq_work_queue+0x2d/0x80 [ 3184.025542] ? __wake_up_klogd.part.0+0x5d/0xa0 [ 3184.026169] ? vprintk_emit+0x125/0x560 [ 3184.026700] ? hci_cmd_sync_submit+0x3b/0x2d0 [ 3184.027309] ? __pfx___mutex_lock+0x10/0x10 [ 3184.027884] ? vprintk+0x90/0xa0 [ 3184.028345] ? _printk+0xbf/0x100 [ 3184.028816] ? __pfx__printk+0x10/0x10 [ 3184.029453] ? __pfx_abort_conn_sync+0x10/0x10 [ 3184.030059] hci_cmd_sync_submit+0x3b/0x2d0 [ 3184.030656] ? __pfx_abort_conn_sync+0x10/0x10 [ 3184.031258] hci_cmd_sync_queue+0x7b/0xb0 [ 3184.031814] hci_disconnect+0x1c2/0x450 [ 3184.032342] ? __pfx_hci_disconnect+0x10/0x10 [ 3184.032932] ? __pfx_lock_release+0x10/0x10 [ 3184.033484] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 3184.034166] __check_timeout+0x2cc/0x480 [ 3184.034699] hci_tx_work+0x7cb/0x1a70 [ 3184.035229] ? pwq_activate_inactive_work+0x298/0x550 [ 3184.035904] ? __pfx_hci_tx_work+0x10/0x10 [ 3184.036455] process_one_work+0xabf/0x1770 [ 3184.037016] ? __pfx_lock_acquire+0x10/0x10 [ 3184.037576] ? __pfx_process_one_work+0x10/0x10 [ 3184.038196] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 3184.038808] worker_thread+0x64f/0x12a0 [ 3184.039343] ? __pfx_worker_thread+0x10/0x10 [ 3184.039920] kthread+0x33f/0x440 [ 3184.040366] ? __pfx_kthread+0x10/0x10 [ 3184.040869] ret_from_fork+0x2f/0x70 [ 3184.041357] ? __pfx_kthread+0x10/0x10 [ 3184.041869] ret_from_fork_asm+0x1b/0x30 [ 3184.042431] RIP: 0000:0x0 [ 3184.042805] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [ 3184.043616] RSP: 0000:0000000000000000 EFLAGS: 00000000 ORIG_RAX: 0000000000000000 [ 3184.044563] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 3184.045449] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 3184.046337] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3184.047218] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3184.048089] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 3184.048973] 17:24:08 executing program 5: prctl$PR_SET_FP_MODE(0x2d, 0x3) 17:24:08 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x0, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:24:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}], 0x10}) [ 3184.050321] Bluetooth: Wrong link type (-22) [ 3184.052019] Bluetooth: hci4: link tx timeout [ 3184.052338] Bluetooth: hci4: killing stalled connection 11:aa:aa:aa:aa:aa 17:24:08 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:24:08 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ioprio_get$pid(0x1, r1) r2 = perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r1, 0x8, r0, 0x9) syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYRESHEX=r2], 0x1) fork() syz_emit_vhci(&(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) [ 3184.073407] SELinux: security_context_str_to_sid (root) failed with errno=-22 [ 3184.129945] Bluetooth: hci1: unexpected event for opcode 0x043d [ 3185.975695] Bluetooth: hci3: command 0x0406 tx timeout [ 3186.103732] Bluetooth: hci4: command 0x0406 tx timeout [ 3187.832354] ------------[ cut here ]------------ [ 3187.833079] WARNING: CPU: 0 PID: 14275 at net/bluetooth/hci_conn.c:619 hci_conn_timeout+0x81/0x130 [ 3187.834329] Modules linked in: [ 3187.834799] CPU: 0 PID: 14275 Comm: kworker/u5:2 Tainted: G W 6.5.0-rc1-next-20230712 #1 [ 3187.836049] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3187.837143] Workqueue: hci3 hci_conn_timeout [ 3187.837787] RIP: 0010:hci_conn_timeout+0x81/0x130 [ 3187.838466] Code: ee e8 d3 62 6a fd 85 ed 78 1b e8 2a 67 6a fd 31 ff 89 ee e8 c1 62 6a fd 85 ed 74 10 5b 5d 41 5c e9 14 67 6a fd e8 0f 67 6a fd <0f> 0b e8 08 67 6a fd 48 8d bb c9 fd ff ff 48 b8 00 00 00 00 00 fc [ 3187.840830] RSP: 0018:ffff888040ef7ce0 EFLAGS: 00010293 [ 3187.841531] RAX: 0000000000000000 RBX: ffff888041086270 RCX: 0000000000000000 [ 3187.842490] RDX: ffff888042c4d1c0 RSI: ffffffff83e20ed1 RDI: 0000000000000005 [ 3187.843431] RBP: 00000000fffffffe R08: 0000000000000005 R09: 0000000000000000 [ 3187.844364] R10: 00000000fffffffe R11: 0000000000000000 R12: ffff888040ef7d90 [ 3187.845300] R13: ffff88800f76de00 R14: ffff88800fde3000 R15: ffff888013f46c00 [ 3187.846242] FS: 0000000000000000(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 3187.847291] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3187.848068] CR2: 000056290cce1618 CR3: 0000000005482000 CR4: 0000000000350ef0 [ 3187.849010] Call Trace: [ 3187.849355] [ 3187.849693] ? __warn+0xe6/0x340 [ 3187.850157] ? hci_conn_timeout+0x81/0x130 [ 3187.850797] ? report_bug+0x2fe/0x400 [ 3187.851324] ? handle_bug+0x3c/0x70 [ 3187.851871] ? exc_invalid_op+0x18/0x50 [ 3187.852431] ? asm_exc_invalid_op+0x1a/0x20 [ 3187.853055] ? hci_conn_timeout+0x81/0x130 [ 3187.853663] ? hci_conn_timeout+0x81/0x130 [ 3187.854260] process_one_work+0xabf/0x1770 [ 3187.854879] ? __pfx_lock_acquire+0x10/0x10 [ 3187.855465] ? __pfx_process_one_work+0x10/0x10 [ 3187.856141] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 3187.856813] worker_thread+0x64f/0x12a0 [ 3187.857374] ? __pfx_worker_thread+0x10/0x10 [ 3187.858012] kthread+0x33f/0x440 [ 3187.858496] ? __pfx_kthread+0x10/0x10 [ 3187.859067] ret_from_fork+0x2f/0x70 [ 3187.859583] ? __pfx_kthread+0x10/0x10 [ 3187.860143] ret_from_fork_asm+0x1b/0x30 [ 3187.860731] RIP: 0000:0x0 [ 3187.861121] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [ 3187.861996] RSP: 0000:0000000000000000 EFLAGS: 00000000 ORIG_RAX: 0000000000000000 [ 3187.863042] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 3187.864000] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 3187.864960] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 3187.865919] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 3187.866885] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 3187.867859] [ 3187.868180] irq event stamp: 5733 [ 3187.868666] hardirqs last enabled at (5733): [] finish_task_switch.isra.0+0x203/0x830 [ 3187.869948] hardirqs last disabled at (5732): [] __schedule+0x127d/0x2b00 [ 3187.871089] softirqs last enabled at (5730): [] irq_exit_rcu+0x93/0xc0 [ 3187.872208] softirqs last disabled at (5205): [] irq_exit_rcu+0x93/0xc0 [ 3187.873315] ---[ end trace 0000000000000000 ]--- 17:24:17 executing program 7: syz_emit_vhci(&(0x7f0000000080)=ANY=[@ANYBLOB="03c900910f2c8c7559763c45d5b6580194e6c12e66f6cfce73a5757359be5c589951f11fe31f98a7db3d46130a135d3acc6702576c66075068372737cc249e7853d84a12cce7e935bec7ac2d39174ab1f49be58a5f991372cfd0ade1e7a3926f2ba969aa1afbe1bfde22c8dbc016d4ddba6b8e2ca2d8555b5fdb39b20be0ff9e5b624b81369c2640a621ef3ea38e7a000000000000"], 0x95) syz_emit_vhci(&(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) syz_emit_vhci(&(0x7f0000000140)=@HCI_EVENT_PKT={0x4, @hci_ev_stack_internal={{0xfd, 0x9b}, {0x2, "360c86853ea59895144718781b8af85240e27ce3c3167412615f25ee96db4971142e436aedc8572f1ddde435ebce565b5c173122e0071f4fade6498e5844c80619d3ebd9d46e349680164598959e1e9d9ef643a79743b5565afefcdf4b3461d49a6d99eee33e7c6086f43e14d86f34e93f005c6a8924adb5c47d29ca82d198de59ba05eccd67f6732e038139c786574dd15382461e84b32390"}}}, 0x9e) 17:24:17 executing program 6: syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0x1}}}, 0x4) syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_link_key_notify={{0x18, 0x17}, {@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, "1ed2cb37e23dd9ef83a193b0e1b51aed", 0x8}}}, 0x1a) 17:24:17 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x0, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:24:17 executing program 5: syz_emit_vhci(&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x102) syz_emit_vhci(&(0x7f0000000040)=@HCI_ACLDATA_PKT={0x2, {0xc9, 0x3, 0x3, 0x77}, @l2cap_cid_signaling={{0x73}, [@l2cap_cmd_rej_unk={{0x1, 0x6, 0x2}, {0x8001}}, @l2cap_info_rsp={{0xb, 0x40, 0x37}, {0x7, 0x9, "228038ceace9cee05756b11635afd2c7ee47169da1d55b95ba977a5509cd795e280ef3f3546d315649f85b7deeb3dee223dc24"}}, @l2cap_create_chan_req={{0xc, 0x1, 0x5}, {0x6, 0x1, 0x7}}, @l2cap_conf_req={{0x4, 0x1, 0x25}, {0x5, 0x7, [@l2cap_conf_fcs={0x5, 0x1}, @l2cap_conf_mtu={0x1, 0x2, 0xe}, @l2cap_conf_efs={0x6, 0x10, {0x2, 0x2, 0x1, 0x1, 0x45c, 0x401}}, @l2cap_conf_ews={0x7, 0x2, 0x8000}, @l2cap_conf_ews={0x7, 0x2, 0x8}]}}]}}, 0x7c) syz_emit_vhci(&(0x7f0000000000)=@HCI_SCODATA_PKT={0x3, {0x1, 0x2b}, "dd2e5bf76e0d084df545bee505bc7c4abd069616651498f9bf1bd5cf38b5242da9f313d51e83f2901f79eb"}, 0x2f) 17:24:17 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)=0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x80, 0x80, 0x1, 0x1, 0x0, 0x40, 0x20000, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x81, 0x40}, 0x80, 0x7, 0x3, 0x5, 0x2, 0x707207ca, 0x886, 0x0, 0x4, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6}, r4, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5805381d5713e988a09d7", 0xaf, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) 17:24:17 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}], 0x48}) 17:24:17 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) 17:24:17 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000007c0)) pread64(r0, &(0x7f0000000280)=""/13, 0xd, 0x0) close(r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0xe0000004}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000800)={0x2, 'syzkaller0\x00', {0xffffff2c}, 0x3f}) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x44}, 0x9}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0xb0, 0x7, 0x7, 0x0, 0x27, 0x800, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x4}, 0x42b80, 0x0, 0x3f, 0x8, 0x8, 0x800, 0x80, 0x0, 0x6, 0x0, 0x200}, r3, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file1\x00', 0x3f, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="049508367ef3abb4a325db1ae995e9901fc03ffff4862aabd8f83cebc5bac8f05bfdbc135e7b7961af1b99d6e369650ba928b01678a027e7ca8b0041a01b774b1ec1828d86882fee42fb14ad1a228bf3c10cc5349b914b163908b287d3fd7afdf3f8b07cc3c9e0acb8fda7aba28d5e34042f0c0e39", 0x75, 0x2cad}, {&(0x7f0000000400)="67667c048053af40f470c46e48b5", 0xe}, {&(0x7f0000000440)="4974e90ddbdc59ee9d4f445ab875895ea3ce03e4f78935937d7ceebe8c7143809244882aa34c785799366bfe286c9238deaac045b0f315b5aecd425a47467d5fdde6be8b98cf463f009677b91efac0744b32614c18314e9f48b0f3a40ab33a0a5ab8703f704f9cd52bcd7d54e98f10db6d7e5877624dbe79e4ead745dd356e045f06bd41ccc432d3100d11ae8635a2909dce1324846a8660af30a2beb7e3adaf556e8b5aa5", 0xa5, 0x3}, {&(0x7f0000000600)="63084b28f491f2a91a0525290016a338316687b36921703da0affb3cdb02d8d27d6c8765385b060e035f1cba0b5ac44e197e5054f6573e1d342803f5911ddc99c36b13e6609eac7a5495cf4da7d7ceda85ab8ddf5096cf68e65446bf9ca570194e8d6d46772c68fb70e20626eadc714a95c8ad89ec63569a1b1670ca1f0d5aad84d2e393d1950596bf5048378b7164462e2f2b89fcf2a0d02867f33047897e6c7fb7d8adc568e1fb8bd009a8beb3fbf4d9487fbc705746347d0a01e6b8c749543f837c9eaf266a25be06598896bdd0792ac94eed15f608b17a4a906fcedf206ad8c58b996130da", 0xe7, 0x4a5c}], 0x908040, &(0x7f0000000840)=ANY=[@ANYBLOB="6e725f696e6f6465733d002c6e725f697e6f6465733d7439703478322c686173682c686173682c004fd208433a16fce63102c46c140d90489ae7abd81e48f5c73c1b848468358e3ba0f1d1e9aed82fdcf7489c00b3c68156dc538672bf6e9e9d789dba0cd1d1daa5845d405cacc7b2287c611ca35a81559f31ef5be8319145e313d4f3263766348121b807a7fdd6edcd2d50db87ace412858302b622282d524251fbfcfc2948433cf6e82959880a0b84a588340bd90d28710b03dca6edf955503198d249c986881777dcf6670dcffb8e6264722febd500369e3789ba0a5dce"]) [ 3193.085732] Bluetooth: hci4: SCO packet for unknown connection handle 1 [ 3193.088300] SELinux: security_context_str_to_sid (root) failed with errno=-22 [ 3193.089476] Bluetooth: hci4: SCO packet for unknown connection handle 1 [ 3193.095524] loop1: detected capacity change from 0 to 40 [ 3193.130182] Bluetooth: hci1: unexpected event for opcode 0x043d 17:24:17 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt}], 0x4c}) 17:24:17 executing program 7: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="02c900f7c4d1a9c5bb270a000600de734e7102003f00"], 0xf) 17:24:17 executing program 1: syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="ed984c4be551911d"], 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) r2 = getpid() ioprio_get$pid(0x1, r2) syz_emit_vhci(&(0x7f0000000940)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r2, 0x8, r0, 0x9) r3 = openat2(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x1, 0x185, 0x8}, 0x18) mknodat$loop(r3, &(0x7f0000000380)='./file0\x00', 0x400, 0x0) r4 = openat$incfs(r1, &(0x7f00000001c0)='.pending_reads\x00', 0xc2600, 0x5) ioctl$FITHAW(r4, 0xc0045878) newfstatat(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000440)="532831c479aa68106b19881fe6437be668f9bdf97816b2e39af4bd1487dac00008223864ed3ab9ee00b5f62f3170b3d086d83df62a2c01a9d16689515ce80c44ee7c57f47fbf381638d953c21ab0db04e7e81f7519bc134fd5bd389ebfc4ed4d7162b88e6e2957d830a032b68db55f78c055f58a275054cf40418dcf020c10be89be47867e8534a3514bfbcda600a1b8835b8bfaba98552cba0b77b3866da432d7eeb0556d887b961ad740", 0xab, 0x92e}, {&(0x7f0000000600)="c16dfae1e9dd11df7d57fe07266971c9a0a9a2d2862300f57e3bb2402e4b726777a14400c57e125f4e30f6b55a680f5d4b8a9fac7e7a4b8697171719efc3f1b45fe8b2fe0abf8d7d52d3e626fe166a8bdfd4593dfb4cf434045d1f1db9da7a9597c9da1c6f17d75d000725a7b87802a3222a54ba038a05e3bb6f0f5a828861122db602d1339c449a3701dc3405ae153e43ab668b12229958691c76e89acba7cc346cd2eb7a78", 0xa6, 0x3}, {&(0x7f00000006c0)="4702045dced11d8e1884fa04b1ec28f161c017e6e7f9f8c0d91dc5ab95f6bb3c85e3d64b8a2d86a83d8d1600cac1dfc44990f462eb2e9010b452a4e4dfad56be1e40d904806eb5e64d689465846682579eec206a9f693f444a93e50bd3ce4600e6230019bc8a759cefb66f2f8a92bd668de3ede39e131629d64f6c79bab328475e57c0c59d34bb7047bb7855b170f41efdb8ea7c00c8aa3a5e814e5519d5dd", 0x9f, 0x10000}, {&(0x7f0000000500)="1d2390b21115e1bef00126a36304a1f3c3668384cf6cefb44a84d8ea4c7c31a8b07e0d61ad5e9607937d429cadaeb74b65c5c111ba46cad1298a4f498b6e82ba88c0a6696bce0e530616128870fa8950a47536ae15709e1a5f44523444d7eb73995f938417036a6198c019b74169c5dba39f5fba05", 0x75, 0x101}], 0x1208410, &(0x7f00000008c0)={[{@uni_xlate}, {@utf8}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@uid_gt={'uid>', r5}}]}) r6 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpid() ioprio_get$pid(0x1, r7) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x7f, 0x34, 0x0, 0x20, 0x0, 0x1f, 0xf1284, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x1, @perf_config_ext={0xf3, 0x7}, 0x4004, 0x81, 0x101, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8000}, r7, 0x8, r6, 0x9) fgetxattr(r6, &(0x7f0000000240)=@random={'osx.', '\x00'}, &(0x7f0000000280)=""/102, 0x66) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040fdb1eb43d04"], 0x7) [ 3193.178186] SELinux: security_context_str_to_sid (root) failed with errno=-22 17:24:17 executing program 6: syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0x1}}}, 0x4) syz_emit_vhci(&(0x7f0000000040)=@HCI_ACLDATA_PKT={0x2, {0xc9, 0x1, 0x2, 0xd8}, @l2cap_cid_signaling={{0xd4}, [@l2cap_move_chan_rsp={{0xf, 0x81, 0x4}, {0x85, 0x7fff}}, @l2cap_conn_rsp={{0x3, 0x40, 0x8}, {0x9, 0x3, 0x6, 0x1}}, @l2cap_move_chan_rsp={{0xf, 0x2, 0x4}, {0x7, 0x6}}, @l2cap_info_rsp={{0xb, 0x81, 0xb4}, {0x5, 0x6, "55f66658e2588c076b02da58aeb52257b0c427ccefbecc421d932e16441c2f27bcb1b3d934d435a91bd5f2d6bb398d287fa3b19175785a3326a6453c3b1676fcbd1ff322fec1d0b460216af69e5146256e56edca60f22a8726513adfc6719064fe73b9290eae4296a4d6850d2b5b2b52e4812e125b49832da8410e0f259cf0703743489798e50239886e0c7c92a0f10ff4739de25dbd17b72579f183c5f24417d6f96f6f4c2c26afba5693c9935f1e1c"}}]}}, 0xdd) syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_host_features={{0x3d, 0xe}, {@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, "900594ad86efe985"}}}, 0x11) syz_emit_vhci(&(0x7f0000000140)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) syz_emit_vhci(&(0x7f00000009c0)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x1, 0x3, 0x111d}, @l2cap_cid_signaling={{0x1119}, [@l2cap_info_rsp={{0xb, 0x0, 0xf8}, {0xff7f, 0x8000, "de3791d2983a8510e31c777cf3928e4e4bf82706e2bb1af445ec7fd89002602b0791c2ef594bae3bd8837f01f027dbaab1183c17dcda70e5fe09c778959b473caf16c7dca76cb2aff358953058bc7bb6e1bfbd67dcb7853a8ca0c012ddf315acec8420bfa848464acead7e25a0481ce4601337d978ba60cca361d768358af25b223e00b33a94e3ad915cb7fe81e84476a1c620f1ba747b1f93c702e90da73b71e61cfb0a7c4fa418e5b0c4ee75055b162707a554e603b3ba8b70f1677954c75f27fbb77c150cf99a52f05b0006a96942a3f2ed954c52aaaec11fa0a7792d7ac672b4a961176dddd7f9aed8905ead2113a64ce63e"}}, @l2cap_cmd_rej_unk={{0x1, 0x9, 0x2}, {0x7}}, @l2cap_info_rsp={{0xb, 0x4, 0x1004}, {0x6b, 0x309b, "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"}}, @l2cap_move_chan_cfm_rsp={{0x11, 0x9, 0x2}, {0x7f}}, @l2cap_create_chan_req={{0xc, 0x4, 0x5}, {0x4, 0x8, 0x77}}]}}, 0x1122) 17:24:17 executing program 5: r0 = fsmount(0xffffffffffffffff, 0x1, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@private0, 0x2, 0x0, 0xff, 0x7, 0x6, 0x4}, 0x20) syz_emit_vhci(&(0x7f0000000980)=@HCI_EVENT_PKT={0x4, @extended_inquiry_info={{0x2f, 0xff}, {0x1, [{@none, 0x0, 0x0, "c30c5b", 0x0, 0x0, "db30ba492ae7cebc05283ff7316f6f210553ec196d4a18ecf5d01dc1bf997ef13579191093ad7c2097050b9b51724181ceacef3154a0e7263bc3589c93be7217c652e0837c4276244b75a00d7d152938e796920a4def61bae4095fb54159a062fd16816dc45c62affc0a91db419bbaeab0975ae432f34d200d365d0df346882e2c547258e57cab65b7477097aec25c74fd123058f55e16b6a37b2da87d7804ccb4c46e8c72ea562bc610c7c24a1d06577f0b55e43d6f6df8af0fd111dff06245bdbacef41a361bf59e6d1c39bd00d0e256fd63c4e234416496c3c3aae648f90660982ffc989e8bf6535c8c9f54dbf7c9"}]}}}, 0x102) [ 3193.198255] Bluetooth: Unexpected start frame (len 10) [ 3193.223417] loop1: detected capacity change from 0 to 40 [ 3193.262442] Bluetooth: hci1: unexpected event for opcode 0x043d VM DIAGNOSIS: 17:24:08 Registers: info registers vcpu 0 RAX=0000000000000031 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff825190f5 RDI=ffffffff87f828a0 RBP=ffffffff87f82860 RSP=ffff888040ef73e0 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000031 R11=0000000000000001 R12=0000000000000031 R13=ffffffff87f82860 R14=0000000000000010 R15=ffffffff825190e0 RIP=ffffffff8251914d RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f48bdc0ca84 CR3=00000000189da000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=0000ff00000000000000000000000000 XMM01=000001000000000000000000ffffffff XMM02=7463656a6e695f31313230385f7a7973 XMM03=eafd99424e62cef61feebc81ceeede54 XMM04=677d25a406d0cb9ae7ac1c7378a3fbf5 XMM05=96ee8e048c8d196f22dfb5bb35d2cee8 XMM06=bf82552eb2b501ed3a34f82d7e067226 XMM07=f1d2a783aceafd99424e62cef61feebc XMM08=81ceeede546853c68297cfae0bce9810 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=ffff88801037a140 RCX=ffffffff818266bb RDX=1ffff1100206f431 RSI=0000000000000008 RDI=ffff88801037a188 RBP=0000000000000437 RSP=ffff888016ddf7d0 R8 =0000000000000000 R9 =ffffed100206f431 R10=ffff88801037a18f R11=0000000000000001 R12=1ffff11002dbbefb R13=0000000000000000 R14=ffff88801037a1e0 R15=ffff88801037a188 RIP=ffffffff818266da RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fd22251d900 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f9b7cc1b3a4 CR3=000000001659c000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=2038303a34323a3731203231206c754a XMM01=383536392e33383133205b203a6c656e XMM02=68203a65756575716b726f57205d3936 XMM03=72656b2072656c6c616b7a7973203830 XMM04=32312e3120534f4942202c2936393931 XMM05=20435020647261646e61745320554d45 XMM06=205d3538383336392e33383133205b20 XMM07=732038303a34323a3731203231206c75 XMM08=30343d7974696c696261706163202235 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000