[ 44.682298] mcstransd (8265) used greatest stack depth: 19936 bytes left Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 48.162748] kauditd_printk_skb: 4 callbacks suppressed [ 48.162764] audit: type=1400 audit(1546466523.535:35): avc: denied { map } for pid=8344 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 48.205783] sshd (8342) used greatest stack depth: 19848 bytes left Warning: Permanently added '10.128.0.94' (ECDSA) to the list of known hosts. 2019/01/02 22:02:10 fuzzer started [ 54.951016] audit: type=1400 audit(1546466530.315:36): avc: denied { map } for pid=8353 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/01/02 22:02:12 dialing manager at 10.128.0.26:42663 2019/01/02 22:02:12 syscalls: 1 2019/01/02 22:02:12 code coverage: enabled 2019/01/02 22:02:12 comparison tracing: enabled 2019/01/02 22:02:12 setuid sandbox: enabled 2019/01/02 22:02:12 namespace sandbox: enabled 2019/01/02 22:02:12 Android sandbox: /sys/fs/selinux/policy does not exist 2019/01/02 22:02:12 fault injection: enabled 2019/01/02 22:02:12 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/01/02 22:02:12 net packet injection: enabled 2019/01/02 22:02:12 net device setup: enabled 22:05:27 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000006140)='/dev/rtc0\x00', 0x80000, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000006180)={'filter\x00'}, &(0x7f0000006200)=0x78) r1 = syz_open_dev$usbmon(&(0x7f0000006240)='/dev/usbmon#\x00', 0xfffffffffffffffa, 0x10000) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000006280)='/dev/vfio/vfio\x00', 0x88000, 0x0) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f00000062c0), &(0x7f0000006300)=0x4) getsockopt$inet6_mreq(r2, 0x29, 0x1f, &(0x7f0000006340)={@dev}, &(0x7f0000006380)=0x14) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000006400)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000006500)={&(0x7f00000063c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000064c0)={&(0x7f0000006440)={0x68, r3, 0x20a, 0x70bd28, 0x25dfdbfc, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x8, @media='eth\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x10}, 0x40000) unshare(0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000006540)=0x0) sched_setaffinity(r4, 0x8, &(0x7f0000006580)) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000065c0)={0x7e, 0x4, 0x2, 0x3, 0x80000000}) sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f00000066c0)={&(0x7f0000006600)={0x10, 0x0, 0x0, 0x104}, 0xc, &(0x7f0000006680)={&(0x7f0000006640)={0x24, r3, 0x200, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x8}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4004810}, 0x8000) fsync(r0) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000006700)={{&(0x7f0000ffb000/0x4000)=nil, 0x4000}, 0x1}) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000006740)={0x7fffffff, 0x14, [0x8, 0x9, 0x5, 0x3f, 0x7fffffff]}) epoll_pwait(r2, &(0x7f0000006780)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0xa, 0x7ff, &(0x7f0000006800), 0x8) prctl$PR_SET_TIMERSLACK(0x1d, 0xdf5a) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000006840)=0x9d63) sched_setparam(r4, &(0x7f0000006880)=0x1) fcntl$lock(r1, 0x26, &(0x7f00000068c0)={0x0, 0x0, 0x1, 0x0, r4}) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r2, 0x80045530, &(0x7f0000006900)=""/188) write$UHID_CREATE2(r0, &(0x7f00000069c0)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00', 0xef, 0x5, 0x4, 0xc2, 0x9, 0x7, "cbbf9096a11357caf05ba73e4b65b7c007b881fb0735b599bdf6b61450348c711cb378ce8adeccdd7ab37cde9485005b405e5586bcd44baef5fd25f9d9a72c4b2607d381b1f5b9ddba07603d8ce7e4badec58bd76feac72d11e703081a1b38b4349a2d7f7320a849bed5257afc8c2f10d2cbcb52592a1f402ee96dd149acff3cce472c7ad97a267de980a96824a0208b76c61216a04aa4fceac27377419fe3de7417ed1b040af687407267ab7075ddffbd38f91b1698064093f88c1d6756c480f9ac012a66ac0fae2e512e0c39d554bece01a89988106aa00e77b3d1b239615fc4e38880d6a691dce1fb992df54116"}, 0x207) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000006c40)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f0000006d00)={&(0x7f0000006c00)={0x10, 0x0, 0x0, 0x6251012b8f967e7d}, 0xc, &(0x7f0000006cc0)={&(0x7f0000006c80)={0x38, r5, 0x505, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100000001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x40}, 0x40) sendfile(r2, r0, 0x0, 0x8) stat(&(0x7f0000006dc0)='./file0\x00', &(0x7f0000006e00)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000006e80)={{{@in6, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000006f80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000006fc0)={{{@in=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000070c0)=0xe8) stat(&(0x7f0000007100)='./file0\x00', &(0x7f0000007140)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f00000071c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000007240)={0x0, 0x0, 0x0}, &(0x7f0000007280)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000072c0)={0x0, 0x0, 0x0}, &(0x7f0000007300)=0xc) r13 = getegid() setxattr$system_posix_acl(&(0x7f0000006d40)='./file0\x00', &(0x7f0000006d80)='system.posix_acl_default\x00', &(0x7f0000007340)={{}, {0x1, 0x5}, [{0x2, 0x2, r6}, {0x2, 0x1, r7}, {0x2, 0x5, r8}, {0x2, 0x4, r9}, {0x2, 0x6, r10}], {0x4, 0x4}, [{0x8, 0x0, r11}, {0x8, 0x7, r12}, {0x8, 0x0, r13}], {0x10, 0x7}, {0x20, 0x3}}, 0x64, 0x2) [ 251.803942] audit: type=1400 audit(1546466727.175:37): avc: denied { map } for pid=8368 comm="syz-executor0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15405 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 251.902187] IPVS: ftp: loaded support on port[0] = 21 22:05:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = gettid() ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000140)=r3) r4 = accept(r1, 0x0, &(0x7f0000000180)) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000001c0)={0x0, 0x9}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000240)={r5, 0x32, 0x2, [0x3, 0x5]}, &(0x7f0000000280)=0xc) r7 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$update(0x2, r7, &(0x7f0000000340)="c8c155d87eec0452ba4f583553d6a0ee1f3d78476f839d4e584e0107940f38ab68eab7d1ca2d22553fd6e80ad3dd4498171072ccff0a5eaf0a65b57f24f0ca0f0926ab063014688d9d20b260e56469468e3a18df9d1be14b8320a2f091d0346dab", 0x61) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f00000003c0)={0x3, 'rose0\x00', 0x800}, 0x18) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f0000000400)=0x995e) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000480)={0x101, 0x40, 0x10, &(0x7f0000000440)="f9ce679c7477ea4ff70778638319dc1f"}) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r4, 0x84, 0x17, &(0x7f00000004c0)={r6, 0x2, 0x9a, "735d6d3c2c811a33112541f80f37d2fbb51a6dd41a8e982fb2a17a8c946e54caba744ddbed13afce0b59f98f53554f7244273f043ab1cbd11c732f81486701899aa66fe67e3eec6c79f4944604d9f95ff821a8aa6df8732d727286e1573bb9acc57e4f5795b3c9daf947f7b4a7d5a6a7fa07c0d35fed1f9cc6ccfb9eacd99407c6f3454d6af43477f70827d24736ea6685612f60eefb0063c271"}, 0xa2) setsockopt$RXRPC_SECURITY_KEY(r1, 0x110, 0x1, &(0x7f0000000580)='\'(\x00', 0x3) getsockname$netrom(r1, &(0x7f00000005c0)={{0x3, @bcast}, [@rose, @null, @netrom, @rose, @remote, @rose, @default, @netrom]}, &(0x7f0000000640)=0x48) setsockopt$inet_int(r0, 0x0, 0x21, &(0x7f0000000680)=0x7, 0x4) ioctl$DRM_IOCTL_DROP_MASTER(r2, 0x641f) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000006c0)={r5, 0x6, 0x794c}, &(0x7f0000000700)=0x8) prctl$PR_GET_TIMERSLACK(0x1e) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={r8, 0x6, 0x10}, &(0x7f0000000780)=0xc) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000007c0)={r5, @in={{0x2, 0x4e21, @multicast2}}, [0xdad5, 0xffff, 0x1000, 0xfffffffffffffff9, 0x9, 0x2, 0x3, 0xca0, 0x10000, 0xfff, 0x3, 0x81, 0x7, 0x400, 0x6]}, &(0x7f00000008c0)=0x100) clock_gettime(0x0, &(0x7f0000000a00)={0x0, 0x0}) mq_timedsend(r2, &(0x7f0000000900)="8557810c18ad94a5a0470b18e528654b8fa66d03d3ba7e62f5900f9c6ed90548cf77b1143b267fea3df583d8b9d5af33ff69b0bc5abf2302ca8fcb5d91a27005cf2003848c170dd98fc4c831a25b5613ac5fdc7dc4a66b2d306668859a1f68cc7b11c451b981766b17e448ae5c37d239890eec29cbb9c8aae9d8069fa972de7f365b5b2c9d52e7ff5bd76c02086f8543b9e0c5673a51ffc9699cc95ff81ae545d04d3bf7cdc77215b5742a7fe5d63c3e8580bf57c0a8eb89bf5457e1619e301a294e0d8f2c908b0d4d0099206fd10315d6ed7161c28d5b2687d0dea1abefa961a2e69c6af5d9c252f9a708c599e93de9bb9346ad", 0xf4, 0x100000001, &(0x7f0000000a40)={r9, r10+30000000}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000a80)={0xff, 0x1f, 0x7, 0x7, 0xd5d}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/btrfs-control\x00', 0x40, 0x0) ioctl$sock_inet_SIOCDARP(r4, 0x8953, &(0x7f0000000b00)={{0x2, 0x4e24, @empty}, {0x1}, 0x64, {0x2, 0x4e23, @multicast1}, 'ip6gretap0\x00'}) openat$cgroup(r1, &(0x7f0000000b80)='syz1\x00', 0x200002, 0x0) ioctl$IMGETCOUNT(r1, 0x80044943, &(0x7f0000000bc0)) [ 252.018976] chnl_net:caif_netlink_parms(): no params data found [ 252.087665] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.107655] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.115691] device bridge_slave_0 entered promiscuous mode [ 252.134249] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.140717] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.148438] device bridge_slave_1 entered promiscuous mode [ 252.188412] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 252.205106] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 252.239104] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 252.247530] team0: Port device team_slave_0 added [ 252.254802] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 252.259820] IPVS: ftp: loaded support on port[0] = 21 [ 252.273085] team0: Port device team_slave_1 added [ 252.282222] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 252.295175] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 22:05:27 executing program 2: getrusage(0xffffffffffffffff, &(0x7f0000000000)) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x101000, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0xa7db, 0x20000) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000140)={0x800, 0x10001, 0x1, 0xffffffff, 0x9, 0x9}) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000180)=r0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x220}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xd0, r2, 0x900, 0x70bd25, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6b92}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x12}}]}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x18}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x32}]}]}, 0xd0}}, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x4e20, 0x2c, @ipv4={[], [], @local}, 0x80000000}}, 0x7, 0x7ff, 0xfffffffffffffffa, 0x0, 0x2}, &(0x7f0000000480)=0x98) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000004c0)=@assoc_value={r3, 0xfff}, 0x8) sendfile(r1, r0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000500)={0x9}) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000540)) ioctl$VT_ACTIVATE(r1, 0x5606, 0x72a8) prctl$PR_GET_TIMERSLACK(0x1e) syz_open_dev$sndctrl(&(0x7f0000000580)='/dev/snd/controlC#\x00', 0x10000, 0x12000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f00000005c0)={0x10001, 0x40, 0x8, 0x0, 0x0, [], [], [], 0xa9, 0x3}) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000700)={0x1, @dev={[], 0x13}}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000740)={0x0, 0x0}, &(0x7f0000000780)=0xc) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000007c0)) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f0000000800)={0x7, 0x0, [{0x860, 0x0, 0x7}, {0x48c, 0x0, 0x5}, {0x9b2, 0x0, 0x401}, {0xb39, 0x0, 0x9}, {0xc0000080, 0x0, 0x9}, {0xbbe, 0x0, 0x3f}, {0xaff, 0x0, 0x8}]}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000880)={{{@in=@local, @in=@multicast2, 0x4e21, 0x80, 0x4e21, 0x8001, 0xa, 0xa0, 0x20, 0xff, 0x0, r5}, {0x2, 0x2, 0x16b3, 0x1f, 0x100, 0x101, 0x8, 0x9}, {0x7f8000000, 0x9, 0x4, 0xff}, 0xfffffffffffffffd, 0x6e6bb6, 0x2, 0x1, 0x0, 0x2}, {{@in=@empty, 0x4d6, 0x2b}, 0x2, @in6=@mcast2, 0x34ff, 0x2, 0x1, 0x8, 0x5, 0x1, 0x9}}, 0xe8) ptrace$getregset(0x4204, r4, 0x202, &(0x7f00000009c0)={&(0x7f0000000980)=""/31, 0x1f}) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000a00)={0x14, 0x0, 0x10000, 0x70c}) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40106437, &(0x7f0000000a40)={r6, 0x100000001}) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000a80)=0x6) ioctl$KDENABIO(r0, 0x4b36) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000ac0)=0x9, 0x4) ioctl$KDMKTONE(r0, 0x4b30, 0x1000) [ 252.404662] device hsr_slave_0 entered promiscuous mode [ 252.452743] device hsr_slave_1 entered promiscuous mode 22:05:27 executing program 3: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x408000, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x823000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r1, 0x0, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7f}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7fff}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x80) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x18000, 0x0) kexec_load(0xfffffffffffeffff, 0x4, &(0x7f0000000400)=[{&(0x7f00000001c0)="4ef6ee0c4fb0ff2707ddcbedd3345c0ae24f5735009fa1c2053c6ed7e7c0eecd8c04d67cbf4af906db6ababd7c8acfda85133358645b4999e771d46dae9aedba702f547289bb37edb535d60bd22d9bff3b36cba5f019074e1cfd80a4a6051c34353a80736906d81e591b837fabb1d2c1828872bcb5e10475cbab5b27252078c14bdcbf187598355cb8bb77660cd004c5bc7f6d06fd2ca0d1bbf2378c2f299128be18f7f05be671be20c6c77f8f43e183f8b4be5148bb", 0xb6, 0x2, 0x5}, {&(0x7f0000000280)="40b63b0f17ae7ada10f370ec0ffef2a282265a6e8ef6362ccb86e18c3609cc411f59badb55a4a358438fbd95325b675524c3b574377296af82da7437068e4d50735d4cc9823e48178d6d4d5c68ba57bbb28de42979a08a37b57ddb4c0be9b63c47e7d243150f3da347f764a0f52b", 0x6e, 0x90, 0xa}, {&(0x7f0000000300)="43c47b85f08988d6afabf26b273601125b45a9003fd7bd9eebe37a4be657e0a8442c541b36e75f45fe0084aab339863d89a6716a63", 0x35, 0x7, 0x3}, {&(0x7f0000000340)="2ab24e555ef8d265a216acdbbb1d015459c90e3aadce6b1f50f04207155009d4fc2f6134f9e19b6e564d9ad8bf1c85b6c53e1b6bd918686007a859f832530de17db1f87bae4749584a81f9ac1579ee9686499dfacbce4e49599f15e8f39f4681826a0213bf2bf80653e09da63b00bb4cc3bb77918113b5be0331eb3207845a6c4f687cd6cdb66e259436e8515f22d962913c53c84cd4d1bee81df7d62dff59ce4c520a87d81f70eea5517824e9f1", 0xae, 0x7ff, 0x8}], 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000480)={0x2f, @rand_addr=0x3, 0x4e23, 0x3, 'nq\x00', 0x10, 0x2, 0x3f}, 0x2c) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000004c0)={0xfffffffffffffff9, 0x7, 0x8, 0x4, 0x40}) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000500)={0x1, 0x0, 0x7, {0x8, 0x3, 0x1, 0xb80}}) r3 = socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r2, 0xc040564b, &(0x7f0000000540)={0x2178, 0x0, 0x3017, 0xfffffffffffffffc, 0xffffffffffffffff, {0x2, 0x7fffffff}, 0x1}) ioctl$KVM_GET_CPUID2(r0, 0xc008ae91, &(0x7f0000000580)={0x5, 0x0, [{}, {}, {}, {}, {}]}) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000680)={0x2, 0x9}, 0x2) prctl$PR_GET_FP_MODE(0x2e) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000006c0)='/selinux/user\x00', 0x2, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r2, 0x641f) ioctl$RTC_WIE_ON(r2, 0x700f) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000700), &(0x7f0000000740)=0x4) ioctl$FS_IOC_GETVERSION(r3, 0x80087601, &(0x7f0000000780)) fcntl$getownex(r0, 0x10, &(0x7f00000007c0)={0x0, 0x0}) tkill(r4, 0x31) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000800)={0x59, 0x6, 0x0, {0x2, 0x1, 0x30, 0x0, 'keyringsystem%procppp0posix_acl_accesseth1)nodev'}}, 0x59) symlinkat(&(0x7f0000000880)='./file0\x00', r2, &(0x7f00000008c0)='./file0\x00') r5 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000940)='/dev/video36\x00', 0x2, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000b80)={0x60, 0x0, &(0x7f0000000a00)=[@release={0x40046306, 0x1}, @transaction_sg={0x40486311, {{0x2, 0x0, 0x2, 0x0, 0x10, 0x0, 0x0, 0x60, 0x0, &(0x7f0000000980)=[@fda={0x66646185, 0x8, 0x0, 0x3}, @ptr={0x70742a85, 0x1, &(0x7f0000000900), 0x1, 0x0, 0x36}, @fd={0x66642a85, 0x0, r5, 0x0, 0x2}], 0xfffffffffffffffe}, 0x6}}, @release={0x40046306, 0x4}, @register_looper], 0xcb, 0x0, &(0x7f0000000a80)="6479f1e871d58ff330660dd42b7e60b774e71871dc59d46b79a973e351b52cafe772e792f1b821f08a90edad87e93d02cfd61c2a05bf7745ede8c4ca83716dbd1c5fc492b969071c8c80f949d752a5441f4eac218a8d9c91c2c302945cda4d0147c17759ffc0c2eb87d6f815ad89afe50f8ae5149d4c586abfe1b2b9b4b0f9099d0aa9b6fc44bd9ec18f00f4060a2e6f747e0a0cc66ea7d9cc2a0c35e8ed24ac79c0219130e318ecea330985f1b78fa760c8e0a21c521e17ecdc291ef1a5b3cf86bf3af49a0b3bf2327ef0"}) getitimer(0x1, &(0x7f0000000bc0)) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000006e80)={'bcsf0\x00', 0x0}) connect$can_bcm(r0, &(0x7f0000006ec0)={0x1d, r6}, 0x10) ioctl$RTC_AIE_ON(r2, 0x7001) getsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000006f00), &(0x7f0000006f40)=0x4) openat$cgroup_ro(r2, &(0x7f0000006f80)='cpuacct.usage_percpu\x00', 0x0, 0x0) [ 252.531934] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 252.538976] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 252.559115] IPVS: ftp: loaded support on port[0] = 21 [ 252.636114] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.642699] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.649866] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.656289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.749311] IPVS: ftp: loaded support on port[0] = 21 [ 252.769979] chnl_net:caif_netlink_parms(): no params data found 22:05:28 executing program 4: socket$nl_route(0x10, 0x3, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x6, 0x0, 0x9, 0x4, 0x3, 0xfffffffffffffff7, 0x3, 0x0}, &(0x7f0000000080)=0x20) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={r1, 0xfffffffffffffffc, 0x1f}, 0x8) syz_kvm_setup_cpu$x86(r0, r0, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text64={0x40, &(0x7f0000000100)="6623eac4617d6fa9957300000fc75f100f8f0088000036660fdc23c401a8c6d234670f01b605dfdb13f344d9282edbea48b800000100000000000f23d00f21f835000000090f23f8", 0x48}], 0x1, 0x8, &(0x7f00000001c0), 0x0) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f0000000200)={0x92d6, "93df02955d443276a14f601ee217f5b94c305aac9e5b90ca07f4984b36b1ce2d", 0xf0ed09f925830e9f, 0x2, 0x0, 0x8}) ioctl$KVM_S390_UCAS_MAP(r0, 0x4018ae50, &(0x7f0000000280)={0x80, 0x6, 0x3}) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000002c0)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'hsr0\x00', 0x1010}) syz_mount_image$gfs2(&(0x7f0000000340)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x7, 0x4, &(0x7f0000000640)=[{&(0x7f00000003c0)="364d1a1be41dadaba1b0c39088747392fe09cd12a324aead561af24bf529f2f15ee94cf24a5308ac3f36", 0x2a, 0xf301}, {&(0x7f0000000400)="26fef7431f8dd99943a20c3967940b35bce54469ca93844c6474aaef90acaef19680793a019073e906e1bc44c59351aa751124ac98f15903ee68d74f57580ca999b052ec1a4f2d4ec2de9110c92c84dcaff3268c448c7ec1368df6994eb2197eb31dc630afc889da60ae9c6b40ec47abdf9dcc972a5caa902b594f6f759268f51c0829b03bf09ff1ec03623ab87a85c3484e7764400b663f3a2f0e03c1041600b85a5fca449105bc41607072fa882530a03ddd4e875e9fd0546cfbfcd68fc1512a9848fe0d2fd0d1523f82b697bb5f2e", 0xd0, 0xfffffffffffffffa}, {&(0x7f0000000500)="83e39b1f7213ba2d21e7d0fd11a6b46b537a990e896d49dd56e78ba537e548199c7e420071153568221600da26da19113e93c888dfc7b826dc6cf68cad5f52775a23826df92ecc9eab21d49cd7ba5f38b1b5627d2427c5384502895adfc6a43e26225626c7c6e259aa286a70433ee369991f7f42", 0x74, 0x88}, {&(0x7f0000000580)="b52f7a311ae7da5aa33c441ad2e9313ad0ddaecb70576de79fdd88a1e9ebb4522a790e720cbb6dcf63406d5274710e826c39da8e019731c94288adcd9ffeacabe39382dba3eb1fc333bdf1608f4b813de023f8200e5b584b255021c976b8b5f1a2f34f206305d03eba9cd2ef9dfc309f53581d84c6a89b321f8c591e319434befdfea44b217c63f9a803943f8b5f46b7c6", 0x91, 0x1f}], 0x80, &(0x7f00000006c0)={[{@rgrplvb='rgrplvb'}, {@upgrade='upgrade'}, {@rgrplvb='rgrplvb'}, {@norecovery='norecovery'}, {@ignore_local_fs='ignore_local_fs'}, {@quota_on='quota=on'}, {@statfs_quantum={'statfs_quantum', 0x3d, 0x1}}, {@statfs_quantum={'statfs_quantum', 0x3d, 0x5}}, {@localflocks='localflocks'}], [{@permit_directio='permit_directio'}]}) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000780)={0x6, 0x8}) io_setup(0x100, &(0x7f00000007c0)=0x0) clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) io_pgetevents(r2, 0x0, 0x5, &(0x7f0000000800)=[{}, {}, {}, {}, {}], &(0x7f0000000900)={r3, r4+30000000}, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000940)=@assoc_id=r1, 0x4) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000980)={r1, 0x81}, &(0x7f00000009c0)=0x8) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f0000001b40)={0x4, 0x9dd6, 0x2, 0x36, &(0x7f0000000a00)=""/54, 0xdb, &(0x7f0000000a40)=""/219, 0x1000, &(0x7f0000000b40)=""/4096}) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000001b80), &(0x7f0000001bc0)=0x6) clock_gettime(0x1, &(0x7f0000001c00)) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000001c40)) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000001cc0)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000001d80)={&(0x7f0000001c80)={0x10, 0x0, 0x0, 0x110}, 0xc, &(0x7f0000001d40)={&(0x7f0000001d00)={0x30, r6, 0x800, 0x70bd2b, 0x25dfdbff, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x6}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8, 0x2, 0x2}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) socket$tipc(0x1e, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000001dc0)={r1, 0x3, 0x8}, &(0x7f0000001e00)=0x10) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000001e40)={0x0, @bt={0x5, 0x3, 0x0, 0x1, 0x9, 0x401, 0x1000, 0x7fffffff, 0x7, 0x80000000, 0x7, 0x7fffffff, 0x5, 0xfffffffffffffff9, 0x10, 0x34}}) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f0000001f00)={0x0, "38eab4d6de28c8541e38e75cbbb120676152b1f27f9830182401bc01424b45d2", 0x2, 0x1}) ioctl$KVM_SMI(r0, 0xaeb7) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000001f40)={r5, 0x9}, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000001f80)=0x4) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000002000)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000020c0)={&(0x7f0000001fc0)={0x10, 0x0, 0x0, 0x10000080}, 0xc, &(0x7f0000002080)={&(0x7f0000002040)={0x28, r7, 0x0, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000084) [ 252.948272] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 252.958154] 8021q: adding VLAN 0 to HW filter on device bond0 [ 252.978742] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.993625] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.003496] device bridge_slave_0 entered promiscuous mode [ 253.030435] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 253.091911] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.098296] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.116819] device bridge_slave_1 entered promiscuous mode [ 253.128407] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.136704] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.145529] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 22:05:28 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x0, 0x180) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x4e22, 0x1, @local, 0x10001}, {0xa, 0x4e24, 0x5, @empty, 0x4}, 0x0, [0x5, 0xffffffffffffff0c, 0x8, 0x9c, 0x8e83, 0x0, 0x4, 0x20]}, 0x5c) r1 = socket(0x3, 0x4, 0x8) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000100)={0x1000}, 0x4) write$UHID_CREATE(r0, &(0x7f0000000180)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000140), 0x0, 0x400, 0x80000001, 0x5, 0x1, 0x56000}, 0x120) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000002c0), &(0x7f0000000300)=0x4) read$eventfd(r0, &(0x7f0000000340), 0x8) r2 = shmget(0x2, 0x3000, 0x8, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_STAT(r2, 0x2, &(0x7f0000000380)=""/195) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x24, r3, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, 0x0, 0x800b, 0x0, {0x8}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x20048040) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000005c0)={0xffffffffffffffff}, 0x0, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000640)={0x6, 0x118, 0xfa00, {{0x2, 0x6, "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", 0xe5, 0x21, 0x100000001, 0x2, 0x7, 0xfffffffffffffffc, 0x200000000000, 0x1}, r4}}, 0x120) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000780)) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000007c0)={0x7fffffff, 0x0, 0x0, 0x4}) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000800)={r5, 0x7fff}) truncate(&(0x7f0000000840)='./file0\x00', 0x3) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000880)={0x0, 0x34, "399be114c275062f029d7eec8fdef8a111f7c006447b395e52a300a2aae3e4ab5af8d3835e45aafcf8199f3c026c8eaa52ae5f98"}, &(0x7f00000008c0)=0x3c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000900)={r6, @in6={{0xa, 0x4e24, 0x8, @remote, 0x7}}, 0x3ff, 0x0, 0x59, 0x1, 0x8001}, &(0x7f00000009c0)=0x98) ioctl$KVM_HYPERV_EVENTFD(r0, 0x4018aebd, &(0x7f0000000a00)={0x1, r0}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000a40)={r7}, &(0x7f0000000a80)=0x8) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x80000001) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000ac0)={r7, 0x401, 0x400}, 0x8) sendmsg$nl_generic(r0, &(0x7f0000000bc0)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b40)={0x1c, 0x23, 0xb08, 0x0, 0x7, {0x13}, [@typed={0x8, 0x0, @ipv4=@multicast2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8810}, 0x4) r8 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000c40)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000d00)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0xc0a001}, 0xc, &(0x7f0000000cc0)={&(0x7f0000000c80)={0x14, r8, 0x308, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) recvmmsg(r1, &(0x7f00000026c0)=[{{&(0x7f0000000d40)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000001180)=[{&(0x7f0000000dc0)=""/165, 0xa5}, {&(0x7f0000000e80)=""/109, 0x6d}, {&(0x7f0000000f00)=""/245, 0xf5}, {&(0x7f0000001000)=""/157, 0x9d}, {&(0x7f00000010c0)=""/22, 0x16}, {&(0x7f0000001100)=""/5, 0x5}, {&(0x7f0000001140)}], 0x7, &(0x7f0000001200)=""/157, 0x9d}, 0x8000}, {{&(0x7f00000012c0)=@l2, 0x80, &(0x7f0000001440)=[{&(0x7f0000001340)=""/211, 0xd3}], 0x1, &(0x7f0000001480)=""/150, 0x96}, 0x9}, {{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/144, 0x90}], 0x1, &(0x7f0000001640)=""/2, 0x2}, 0x401}, {{&(0x7f0000001680)=@tipc, 0x80, &(0x7f0000001a00)=[{&(0x7f0000001700)=""/184, 0xb8}, {&(0x7f00000017c0)=""/178, 0xb2}, {&(0x7f0000001880)=""/219, 0xdb}, {&(0x7f0000001980)=""/111, 0x6f}], 0x4, &(0x7f0000001a40)=""/114, 0x72}, 0x6}, {{0x0, 0x0, &(0x7f0000001d40)=[{&(0x7f0000001ac0)=""/235, 0xeb}, {&(0x7f0000001bc0)=""/90, 0x5a}, {&(0x7f0000001c40)=""/4, 0x4}, {&(0x7f0000001c80)=""/176, 0xb0}], 0x4, &(0x7f0000001d80)=""/42, 0x2a}, 0xd9}, {{&(0x7f0000001dc0)=@caif, 0x80, &(0x7f0000002000)=[{&(0x7f0000001e40)=""/143, 0x8f}, {&(0x7f0000001f00)=""/149, 0x95}, {&(0x7f0000001fc0)=""/50, 0x32}], 0x3, &(0x7f0000002040)=""/173, 0xad}}, {{0x0, 0x0, &(0x7f0000002140)=[{&(0x7f0000002100)=""/34, 0x22}], 0x1, &(0x7f0000002180)=""/39, 0x27}, 0x90b}, {{0x0, 0x0, &(0x7f00000025c0)=[{&(0x7f00000021c0)=""/32, 0x20}, {&(0x7f0000002200)=""/219, 0xdb}, {&(0x7f0000002300)=""/72, 0x48}, {&(0x7f0000002380)=""/39, 0x27}, {&(0x7f00000023c0)=""/93, 0x5d}, {&(0x7f0000002440)=""/34, 0x22}, {&(0x7f0000002480)=""/32, 0x20}, {&(0x7f00000024c0)=""/124, 0x7c}, {&(0x7f0000002540)=""/128, 0x80}], 0x9, &(0x7f0000002680)=""/5, 0x5}, 0x1}], 0x8, 0x40, 0x0) [ 253.191602] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 253.200683] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 253.210669] 8021q: adding VLAN 0 to HW filter on device team0 [ 253.244299] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 253.252328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 253.271754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 253.301038] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 253.311349] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 253.321061] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 253.333404] chnl_net:caif_netlink_parms(): no params data found [ 253.334564] IPVS: ftp: loaded support on port[0] = 21 [ 253.350761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 253.359205] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 253.368866] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.375279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.382783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 253.390528] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.398391] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.404748] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.454269] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 253.495033] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 253.503753] team0: Port device team_slave_0 added [ 253.508965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 253.525206] chnl_net:caif_netlink_parms(): no params data found [ 253.557161] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 253.564585] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 253.573006] team0: Port device team_slave_1 added [ 253.596179] IPVS: ftp: loaded support on port[0] = 21 [ 253.604596] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.610967] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.619177] device bridge_slave_0 entered promiscuous mode [ 253.627321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 253.638473] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 253.646177] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 253.687868] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.694523] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.702346] device bridge_slave_1 entered promiscuous mode [ 253.708436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 253.716545] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 253.725192] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 253.760532] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.768671] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.776426] device bridge_slave_0 entered promiscuous mode [ 253.783786] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 253.794776] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 253.854601] device hsr_slave_0 entered promiscuous mode [ 253.921523] device hsr_slave_1 entered promiscuous mode [ 253.989852] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.997598] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.004943] device bridge_slave_1 entered promiscuous mode [ 254.011467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 254.019562] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 254.031242] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 254.043668] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 254.053966] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 254.062643] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 254.087045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 254.095167] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 254.104980] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 254.120794] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 254.128404] team0: Port device team_slave_0 added [ 254.143464] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 254.152422] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 254.160393] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 254.185606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 254.194550] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 254.203233] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 254.210359] team0: Port device team_slave_1 added [ 254.219571] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 254.227122] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 254.244665] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 254.252564] team0: Port device team_slave_0 added [ 254.354109] device hsr_slave_0 entered promiscuous mode [ 254.411431] device hsr_slave_1 entered promiscuous mode [ 254.481957] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 254.489022] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 254.496249] team0: Port device team_slave_1 added [ 254.506388] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 254.515580] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 254.521674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 254.538036] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 254.547095] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 254.634665] device hsr_slave_0 entered promiscuous mode [ 254.671597] device hsr_slave_1 entered promiscuous mode [ 254.712197] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 254.719540] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 254.726942] chnl_net:caif_netlink_parms(): no params data found [ 254.782873] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 254.798608] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.805190] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.812425] device bridge_slave_0 entered promiscuous mode [ 254.819795] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 254.828872] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 254.849281] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.856851] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.865828] device bridge_slave_1 entered promiscuous mode [ 254.877301] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 254.889749] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 254.970074] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 254.979870] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 255.013907] chnl_net:caif_netlink_parms(): no params data found [ 255.026959] audit: type=1400 audit(1546466730.395:38): avc: denied { associate } for pid=8369 comm="syz-executor0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 255.039630] 8021q: adding VLAN 0 to HW filter on device bond0 [ 255.062120] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 255.069586] team0: Port device team_slave_0 added [ 255.104135] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 255.145721] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 255.153140] team0: Port device team_slave_1 added [ 255.158747] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 255.168230] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 255.205324] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 255.239987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 255.248066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 255.257496] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 255.263857] audit: type=1400 audit(1546466730.625:39): avc: denied { create } for pid=8392 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 255.288896] 8021q: adding VLAN 0 to HW filter on device team0 22:05:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) [ 255.291120] audit: type=1400 audit(1546466730.625:40): avc: denied { write } for pid=8392 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 255.315137] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 255.332833] audit: type=1400 audit(1546466730.625:41): avc: denied { read } for pid=8392 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 255.357199] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.370670] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.387272] device bridge_slave_0 entered promiscuous mode [ 255.400664] bridge0: port 2(bridge_slave_1) entered blocking state 22:05:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x400000000002012, r0, 0x0) [ 255.407335] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.415102] device bridge_slave_1 entered promiscuous mode [ 255.429445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 255.452359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 255.460503] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.466905] bridge0: port 1(bridge_slave_0) entered forwarding state [ 255.477698] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 255.484943] audit: type=1400 audit(1546466730.845:42): avc: denied { map } for pid=8400 comm="syz-executor0" path="/dev/ashmem" dev="devtmpfs" ino=17065 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 255.524822] 8021q: adding VLAN 0 to HW filter on device bond0 [ 255.550258] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 255.557868] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 255.569910] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 255.578107] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.584524] bridge0: port 2(bridge_slave_1) entered forwarding state 22:05:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000040)={0x1, 0x0, [{0x840000108}]}) [ 255.594685] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready 22:05:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000040)={0x1, 0x0, [{0x840000108}]}) [ 255.653062] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 255.679851] device hsr_slave_0 entered promiscuous mode [ 255.738519] device hsr_slave_1 entered promiscuous mode [ 255.762401] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 255.769467] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready 22:05:31 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xfffffffffffffffc, 0x0, @ipv4={[], [], @dev}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) [ 255.794919] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 255.812937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 255.822881] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 255.830954] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 255.852697] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 255.885801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 255.896405] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready 22:05:31 executing program 0: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x138, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x2, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bcsf0\x00\x00\x00\x00\b\x00', 's\x01\x000\x00\x00\x02\x00\x00\x00\xff\xff\x00', 'vcan0\x00', 'vlan0\x00', @broadcast, [], @empty, [], 0x70, 0x70, 0xa8}}, @common=@dnat={'dnat\x00', 0x10, {{@link_local, 0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1b0) [ 255.908707] 8021q: adding VLAN 0 to HW filter on device bond0 [ 255.928203] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 255.948289] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 255.962844] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 255.973687] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 255.986358] 8021q: adding VLAN 0 to HW filter on device team0 [ 255.996134] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 255.999798] ebtables: ebtables: counters copy to user failed while replacing table [ 256.015741] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 256.022516] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 256.029939] team0: Port device team_slave_0 added [ 256.038307] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 256.046615] ebtables: ebtables: counters copy to user failed while replacing table [ 256.055753] team0: Port device team_slave_1 added 22:05:31 executing program 0: ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x81, 0x0) write$P9_RVERSION(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="15"], 0x1) [ 256.062121] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 256.075850] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 256.084413] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 256.095417] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 256.113925] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 256.133593] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 256.144272] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 256.152256] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 256.159719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 256.169675] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 256.178785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 256.186419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 256.193807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 256.202327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 256.213293] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.219666] bridge0: port 1(bridge_slave_0) entered forwarding state [ 256.229052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 256.237096] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 256.245331] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.251783] bridge0: port 2(bridge_slave_1) entered forwarding state [ 256.266499] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 256.272784] 8021q: adding VLAN 0 to HW filter on device team0 [ 256.284154] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 256.292794] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 256.307175] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 256.315446] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 256.323634] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 256.342077] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 256.352462] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 256.394690] device hsr_slave_0 entered promiscuous mode [ 256.442189] device hsr_slave_1 entered promiscuous mode [ 256.481529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 256.489392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 256.508908] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 256.517966] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 256.529527] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 256.537654] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 256.545936] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 256.553706] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.560040] bridge0: port 1(bridge_slave_0) entered forwarding state [ 256.567133] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 256.575262] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 256.584623] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 256.594808] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 256.604601] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 256.617656] 8021q: adding VLAN 0 to HW filter on device bond0 [ 256.624613] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 256.633186] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 256.640139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 256.647957] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 256.655541] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 256.664232] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 256.674064] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 256.686117] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 256.692541] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 256.702553] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 256.717689] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 256.724699] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 256.733163] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 256.740697] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.747112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 256.754527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 256.765655] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 256.776017] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 256.785902] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 256.800977] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 256.808410] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 256.816749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 256.826384] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 256.834229] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 256.841048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 256.851082] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 256.861253] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 256.872837] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 256.878922] 8021q: adding VLAN 0 to HW filter on device team0 [ 256.885932] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 256.897601] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 256.906776] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 256.913315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 256.923433] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 256.934745] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 256.943239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 256.952101] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 256.959612] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 256.967652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 256.975505] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.981918] bridge0: port 1(bridge_slave_0) entered forwarding state [ 256.990127] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 256.997545] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 257.008914] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 257.019232] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 257.033552] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 257.045432] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 257.053265] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.059599] bridge0: port 2(bridge_slave_1) entered forwarding state [ 257.069905] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 257.083811] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 257.095264] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 257.104142] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 257.119628] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 257.129797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 257.138607] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 257.146860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 257.155250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 257.163562] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 257.188993] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 257.212602] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 257.223346] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 257.238328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 257.250043] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 22:05:32 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) flock(r0, 0x2) msgrcv(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4f424ff2d7f72d0adc79cdb867bf2f291a0514327ead6a2a79d4e3c228a2e19911f9a84f4daa3e7345a6bc648564884d296fb318"], 0x1, 0x0, 0x0) [ 257.270246] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 257.297962] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 257.310040] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 257.343581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 257.361962] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 257.373197] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 257.387077] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 257.396319] Unknown ioctl 43783 [ 257.411312] Unknown ioctl 1077980791 [ 257.415776] Unknown ioctl -1056156351 [ 257.426107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 257.438752] Unknown ioctl 1074310793 [ 257.445807] Unknown ioctl 1074816055 [ 257.448444] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 257.449861] Unknown ioctl 44640 [ 257.467278] Unknown ioctl 19254 [ 257.471571] 8021q: adding VLAN 0 to HW filter on device bond0 [ 257.473617] Unknown ioctl 19248 [ 257.481964] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 257.488214] Unknown ioctl 43783 22:05:32 executing program 2: pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) getgid() r0 = gettid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) [ 257.496798] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 257.503682] Unknown ioctl 1077980791 [ 257.507560] Unknown ioctl -1056156351 [ 257.512322] Unknown ioctl 1074310793 [ 257.516304] Unknown ioctl 1074816055 [ 257.517007] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 257.520145] Unknown ioctl 44640 [ 257.538513] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 257.553284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 257.565656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 257.579273] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 257.594058] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 257.605312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 257.622471] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 257.630014] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 257.646912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 257.657905] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 257.673872] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 257.685245] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 257.693088] 8021q: adding VLAN 0 to HW filter on device team0 [ 257.702905] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 257.727315] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 257.734015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 257.743059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 257.760626] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.767050] bridge0: port 1(bridge_slave_0) entered forwarding state [ 257.778096] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 257.790813] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 257.798503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 22:05:33 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 257.809121] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 257.817463] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 257.825478] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.831925] bridge0: port 2(bridge_slave_1) entered forwarding state [ 257.849755] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 257.881672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 257.907083] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 257.925648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 257.956039] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 257.980387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 257.993532] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 258.011261] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 258.018635] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 258.027507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 258.041763] gfs2: invalid mount option: permit_directio [ 258.047350] gfs2: can't parse mount arguments [ 258.048174] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 258.076632] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 258.083712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 258.091402] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 258.108719] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 258.128396] gfs2: invalid mount option: permit_directio [ 258.134371] gfs2: can't parse mount arguments [ 258.139833] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 258.150016] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 258.160347] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 258.167242] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 258.194027] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 258.208204] 8021q: adding VLAN 0 to HW filter on device batadv0 22:05:33 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'\x00\xacr\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x102}) r1 = socket$nl_route(0x10, 0x3, 0x0) preadv(r0, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/164, 0xa4}], 0x1, 0x0) pipe2(0x0, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000340)=""/68, 0x44}], 0x1, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 22:05:33 executing program 5: ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0xc0481273, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x40100) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) 22:05:33 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000100)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000000000002, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) msgrcv(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="64869ca32f1609cab883efc4430e0bad6e9da8ebe6923bc8e9bb184f2c6d7630103b775cc8d81702ce321ed499d12d3db46116e365ac3e1f47e43e3da725113d5b611d19afacb84675d6c35bb93009483164391713f36dfad257d27564f98332c7b3662a0ff64ef72d401011de0303ce1baaeec01c71e2962609f16b668104847048eab4bd130c9054daa680fc73eb80ea2c6f053b754591", @ANYRESHEX=r1], 0x2, 0x0, 0x0) 22:05:33 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000100)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000000000002, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) msgrcv(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="64869c37be72e4fddd7e0ae16087dcf944e3bd1a2db81d8e584574f9f041d50a1a61026809133995c7ae3aa7dc622eacca270dad1d2810e824ff0f2dc41919785b1102b8c283596db9be8fe953baf566518ceaa2c684bd2f4ff174569d6c7a15acb7d22ac7217832234333f003166344866296544c456ef653eb7e609734240371707ce95800524196d46a"], 0x1, 0x0, 0x0) 22:05:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d4, &(0x7f00000000c0)="000002") ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, 0x0) 22:05:33 executing program 0: getrusage(0x0, &(0x7f00000000c0)) 22:05:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x800336) ioctl$sock_ifreq(r1, 0x8914, &(0x7f00000000c0)={'eql\x00\x00\x00\xa9[\x00', @ifru_mtu=0x1}) 22:05:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d4, &(0x7f00000000c0)="000002") ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, 0x0) [ 258.529552] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:05:33 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000025c0)=0x204, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='lp\x00', 0x3) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x220200, 0x0) getsockopt$inet_udp_int(r1, 0x11, 0x0, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='dctcp\x00', 0x6) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f00000001c0)={0x0, r1}) socket$inet6(0xa, 0x3, 0x7) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x2200, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000480)={r2, r2, 0xd, 0x2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 258.570083] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:05:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d4, &(0x7f00000000c0)="000002") ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, 0x0) [ 258.645524] hrtimer: interrupt took 34072 ns [ 258.662051] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 259.179782] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 259.234944] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 22:05:35 executing program 2: pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) getgid() r0 = gettid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 22:05:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d4, &(0x7f00000000c0)="000002") ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, 0x0) 22:05:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x50, 0x0, [{0x40000105}]}) 22:05:35 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) write(r1, 0x0, 0x0) close(r1) socket$unix(0x1, 0x2, 0x0) tkill(r0, 0x1000000000016) 22:05:35 executing program 4: 22:05:35 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000025c0)=0x204, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='lp\x00', 0x3) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x220200, 0x0) getsockopt$inet_udp_int(r1, 0x11, 0x0, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='dctcp\x00', 0x6) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f00000001c0)={0x0, r1}) socket$inet6(0xa, 0x3, 0x7) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x2200, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000480)={r2, r2, 0xd, 0x2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 22:05:36 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000240)) 22:05:36 executing program 2: pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) getgid() r0 = gettid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 22:05:36 executing program 5: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mq_open(&(0x7f0000000040)='/-+GPL-vboxnet0nodev-em1em0]\x00', 0x841, 0x0, 0x0) write(r2, &(0x7f0000000340), 0x10000014c) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) 22:05:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d4, &(0x7f00000000c0)="000002") 22:05:36 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000240)) 22:05:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000340)=[@in6={0xa, 0x0, 0x0, @remote, 0x6}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000040)=0x8) 22:05:36 executing program 2: pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) getgid() r0 = gettid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 22:05:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d4, &(0x7f00000000c0)="000002") 22:05:36 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000240)) 22:05:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d4, &(0x7f00000000c0)="000002") 22:05:36 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000240)) 22:05:36 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000025c0)=0x204, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='lp\x00', 0x3) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x220200, 0x0) getsockopt$inet_udp_int(r1, 0x11, 0x0, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='dctcp\x00', 0x6) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f00000001c0)={0x0, r1}) socket$inet6(0xa, 0x3, 0x7) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x2200, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000480)={r2, r2, 0xd, 0x2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 22:05:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d4, &(0x7f00000000c0)="000002") 22:05:36 executing program 4: ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x400443c8, &(0x7f0000000240)) 22:05:37 executing program 5: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mq_open(&(0x7f0000000040)='/-+GPL-vboxnet0nodev-em1em0]\x00', 0x841, 0x0, 0x0) write(r2, &(0x7f0000000340), 0x10000014c) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) 22:05:37 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d4, &(0x7f00000000c0)="000002") 22:05:37 executing program 4: ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x400443c8, &(0x7f0000000240)) [ 261.810228] syz-executor1 (8554) used greatest stack depth: 17464 bytes left 22:05:37 executing program 1: unshare(0x6c060000) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001340)={0x0, 0xfffffddc, &(0x7f0000001300)={&(0x7f0000000080)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0xc, 0x4, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x3}]]}}}]}, 0x40}}, 0x0) [ 262.035779] IPVS: ftp: loaded support on port[0] = 21 22:05:39 executing program 2: pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) getgid() r0 = gettid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) ptrace(0x10, r0) 22:05:39 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000025c0)=0x204, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='lp\x00', 0x3) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x220200, 0x0) getsockopt$inet_udp_int(r1, 0x11, 0x0, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='dctcp\x00', 0x6) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f00000001c0)={0x0, r1}) socket$inet6(0xa, 0x3, 0x7) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x2200, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000480)={r2, r2, 0xd, 0x2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 22:05:39 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d4, &(0x7f00000000c0)="000002") 22:05:39 executing program 4: ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x400443c8, &(0x7f0000000240)) 22:05:39 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16ea) read(r0, &(0x7f0000000140)=""/255, 0xff) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) syz_emit_ethernet(0x54, &(0x7f0000000240), 0x0) 22:05:39 executing program 5: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mq_open(&(0x7f0000000040)='/-+GPL-vboxnet0nodev-em1em0]\x00', 0x841, 0x0, 0x0) write(r2, &(0x7f0000000340), 0x10000014c) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) 22:05:39 executing program 1: 22:05:39 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d4, &(0x7f00000000c0)="000002") 22:05:39 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x400443c8, &(0x7f0000000240)) 22:05:39 executing program 2: pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) getgid() r0 = gettid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 22:05:39 executing program 1: 22:05:39 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d4, &(0x7f00000000c0)="000002") 22:05:39 executing program 2: pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) getgid() r0 = gettid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 22:05:40 executing program 0: 22:05:40 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x400443c8, &(0x7f0000000240)) 22:05:40 executing program 1: 22:05:40 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x0, &(0x7f00000000c0)="000002") 22:05:40 executing program 5: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mq_open(&(0x7f0000000040)='/-+GPL-vboxnet0nodev-em1em0]\x00', 0x841, 0x0, 0x0) write(r2, &(0x7f0000000340), 0x10000014c) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) 22:05:40 executing program 1: 22:05:40 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x0, &(0x7f00000000c0)="000002") 22:05:40 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x400443c8, &(0x7f0000000240)) 22:05:40 executing program 0: 22:05:40 executing program 1: 22:05:40 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, 0x0) 22:05:42 executing program 2: pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) getgid() r0 = gettid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 22:05:42 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x0, &(0x7f00000000c0)="000002") 22:05:42 executing program 0: 22:05:42 executing program 1: 22:05:42 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, 0x0) 22:05:42 executing program 5: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mq_open(&(0x7f0000000040)='/-+GPL-vboxnet0nodev-em1em0]\x00', 0x841, 0x0, 0x0) write(r2, &(0x7f0000000340), 0x10000014c) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 22:05:42 executing program 0: 22:05:42 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d4, 0x0) 22:05:43 executing program 1: 22:05:43 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, 0x0) 22:05:43 executing program 1: 22:05:43 executing program 4: 22:05:43 executing program 2: pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) getgid() r0 = gettid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 22:05:43 executing program 0: 22:05:43 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d4, 0x0) 22:05:43 executing program 4: 22:05:43 executing program 0: 22:05:43 executing program 5: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mq_open(&(0x7f0000000040)='/-+GPL-vboxnet0nodev-em1em0]\x00', 0x841, 0x0, 0x0) write(r2, &(0x7f0000000340), 0x10000014c) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 22:05:43 executing program 1: 22:05:43 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d4, 0x0) 22:05:43 executing program 4: 22:05:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d4, &(0x7f00000000c0)="000002") ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, &(0x7f0000000040)={0x9, 0x8, [0x8, 0x0]}) 22:05:43 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d4, &(0x7f00000000c0)) 22:05:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$read(0xb, r0, 0x0, 0x0) 22:05:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x4, 0x4, 0x8000000000005}, 0x2c) close(r1) 22:05:46 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) flock(r0, 0x2) msgrcv(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="fa9e3fa258b6094f4f192824bc79000000002bb4b02fae633472bc4e7b1cd6278f04905c45340000000000000000000000000000cb8e5ff2a8f8b3509b099e71511c"], 0x1, 0x0, 0x0) 22:05:46 executing program 2: pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) getgid() r0 = gettid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 22:05:46 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d4, &(0x7f00000000c0)) 22:05:46 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) read(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = gettid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) fstat(0xffffffffffffffff, 0x0) ptrace(0x10, r0) 22:05:46 executing program 5: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mq_open(&(0x7f0000000040)='/-+GPL-vboxnet0nodev-em1em0]\x00', 0x841, 0x0, 0x0) write(r1, &(0x7f0000000340), 0x10000014c) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) 22:05:46 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d4, &(0x7f00000000c0)) [ 271.090664] audit: type=1400 audit(1546466746.455:43): avc: denied { map_create } for pid=8771 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 22:05:46 executing program 4: pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) getgid() r0 = gettid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) ptrace(0x10, r0) 22:05:46 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d4, &(0x7f00000000c0)='\x00\x00') 22:05:46 executing program 0 (fault-call:1 fault-nth:0): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000240)) [ 271.188468] audit: type=1400 audit(1546466746.455:44): avc: denied { map_read map_write } for pid=8771 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 22:05:46 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000240)) 22:05:46 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d4, &(0x7f00000000c0)='\x00\x00') 22:05:46 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x80086601, &(0x7f0000000240)) 22:05:46 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d4, &(0x7f00000000c0)='\x00\x00') 22:05:49 executing program 2: pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) getgid() r0 = gettid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 22:05:49 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x4b47, &(0x7f0000000240)) 22:05:49 executing program 3 (fault-call:1 fault-nth:0): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d4, &(0x7f00000000c0)="000002") 22:05:49 executing program 5: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mq_open(&(0x7f0000000040)='/-+GPL-vboxnet0nodev-em1em0]\x00', 0x841, 0x0, 0x0) write(r1, &(0x7f0000000340), 0x10000014c) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) 22:05:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3c000000000004000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c000100626f6e64000000000c0002000800120000000000"], 0x3c}}, 0x0) [ 274.135670] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8831 comm=syz-executor1 [ 274.135702] FAULT_INJECTION: forcing a failure. [ 274.135702] name failslab, interval 1, probability 0, space 0, times 1 [ 274.188894] CPU: 0 PID: 8825 Comm: syz-executor3 Not tainted 4.20.0+ #5 [ 274.195679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.205033] Call Trace: [ 274.207722] dump_stack+0x1db/0x2d0 [ 274.211384] ? dump_stack_print_info.cold+0x20/0x20 [ 274.216473] should_fail.cold+0xa/0x15 [ 274.220403] ? rcu_read_unlock_special+0x380/0x380 [ 274.225339] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 274.230472] ? avc_has_perm_noaudit+0x43f/0x630 [ 274.235150] ? avc_has_extended_perms+0x1550/0x1550 [ 274.240211] ? check_preemption_disabled+0x48/0x290 [ 274.245286] __should_failslab+0x121/0x190 [ 274.249557] should_failslab+0x9/0x14 [ 274.253349] kmem_cache_alloc_node+0x56/0x710 [ 274.257882] __alloc_skb+0xf4/0x730 [ 274.261516] ? skb_scrub_packet+0x440/0x440 [ 274.265860] ? kasan_check_read+0x11/0x20 [ 274.270090] ? do_raw_spin_unlock+0xa0/0x330 [ 274.274536] create_monitor_ctrl_open+0x20a/0x9e0 [ 274.279398] ? selinux_capable+0x36/0x40 [ 274.283465] ? send_monitor_note+0x480/0x480 [ 274.287913] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 274.293531] ? ns_capable_common+0x141/0x170 [ 274.298047] hci_sock_ioctl+0x68c/0x840 [ 274.302031] ? hci_sock_sendmsg+0x2730/0x2730 [ 274.306595] sock_do_ioctl+0xe2/0x400 [ 274.310395] ? do_recvmmsg+0xba0/0xba0 [ 274.314275] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 274.319799] ? lock_downgrade+0x910/0x910 [ 274.323947] ? kasan_check_read+0x11/0x20 [ 274.328115] sock_ioctl+0x32f/0x6c0 [ 274.331797] ? ___might_sleep+0x1e7/0x310 [ 274.335949] ? routing_ioctl+0x8d0/0x8d0 [ 274.340054] ? __fget+0x499/0x710 [ 274.343520] ? __might_sleep+0x95/0x190 [ 274.347520] ? routing_ioctl+0x8d0/0x8d0 [ 274.351588] do_vfs_ioctl+0x107b/0x17d0 [ 274.355565] ? selinux_file_ioctl+0x511/0x720 [ 274.360048] ? selinux_file_ioctl+0x125/0x720 [ 274.364543] ? ioctl_preallocate+0x2f0/0x2f0 [ 274.368946] ? selinux_file_mprotect+0x620/0x620 [ 274.373699] ? __fget_light+0x2db/0x420 [ 274.377816] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 274.383433] ? fput+0x128/0x1a0 [ 274.386774] ? do_syscall_64+0x8c/0x800 [ 274.390768] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 274.396351] ? security_file_ioctl+0x93/0xc0 [ 274.400773] ksys_ioctl+0xab/0xd0 [ 274.404234] __x64_sys_ioctl+0x73/0xb0 [ 274.408135] do_syscall_64+0x1a3/0x800 [ 274.412056] ? syscall_return_slowpath+0x5f0/0x5f0 [ 274.417003] ? prepare_exit_to_usermode+0x232/0x3b0 [ 274.422031] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 274.426915] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.432108] RIP: 0033:0x457ec9 [ 274.435306] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 274.454196] RSP: 002b:00007f6efee81c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 274.461899] RAX: ffffffffffffffda RBX: 00007f6efee81c90 RCX: 0000000000457ec9 [ 274.469164] RDX: 00000000200000c0 RSI: 00000000800448d4 RDI: 0000000000000004 [ 274.476424] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 22:05:49 executing program 4: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) accept$netrom(r1, 0x0, &(0x7f0000000100)) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000000)={0x4, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='\x00c@@'], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000480)="f27aec438116cefc2a394072b6ad8809e53ac6553db7f225a4e47722a00ba8846454ad779316094e4bee8cab76761555d3676404fb3c728f045f7d9ecc9b2662539500d7df7d1802"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f0000000400)=[@reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) ftruncate(r1, 0x5) 22:05:49 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x8903, &(0x7f0000000240)) 22:05:49 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)='net/unix\x00') socketpair$unix(0x1, 0x800000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000000080)}, {&(0x7f0000001180)=""/217}, {&(0x7f00000000c0)=""/57, 0x97}, {&(0x7f0000001280)=""/67}, {&(0x7f0000001300)=""/215}, {&(0x7f0000001400)=""/75}, {&(0x7f0000001480)=""/230}, {&(0x7f0000001580)=""/49}], 0x1000000000000157, 0x0) 22:05:49 executing program 3 (fault-call:1 fault-nth:1): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d4, &(0x7f00000000c0)="000002") [ 274.483698] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6efee826d4 [ 274.490976] R13: 00000000004c31b6 R14: 00000000004d5938 R15: 0000000000000003 22:05:50 executing program 1: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='oom_adj\x00') write$uinput_user_dev(r1, 0x0, 0xe39d) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r0, 0x3, 0x0, 0x408001) fallocate(r0, 0x3, 0xea80, 0xfff9) 22:05:50 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x800443d2, &(0x7f0000000240)) [ 274.641120] FAULT_INJECTION: forcing a failure. [ 274.641120] name failslab, interval 1, probability 0, space 0, times 0 [ 274.662615] binder: 8847:8848 got reply transaction with bad transaction stack, transaction 2 has target 8847:8848 [ 274.666900] audit: type=1400 audit(1546466750.005:45): avc: denied { set_context_mgr } for pid=8847 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 [ 274.694076] CPU: 1 PID: 8849 Comm: syz-executor3 Not tainted 4.20.0+ #5 [ 274.703205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.712561] Call Trace: [ 274.712583] dump_stack+0x1db/0x2d0 [ 274.712601] ? dump_stack_print_info.cold+0x20/0x20 [ 274.712616] ? save_stack+0x45/0xd0 [ 274.712631] ? kasan_kmalloc+0xcf/0xe0 [ 274.712643] ? kasan_slab_alloc+0xf/0x20 [ 274.712655] ? kmem_cache_alloc_node+0x144/0x710 [ 274.712667] ? __alloc_skb+0xf4/0x730 [ 274.712682] ? hci_sock_ioctl+0x68c/0x840 [ 274.712698] should_fail.cold+0xa/0x15 [ 274.712713] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 274.712727] ? lock_downgrade+0x910/0x910 [ 274.727675] ? kasan_check_read+0x11/0x20 [ 274.760687] audit: type=1400 audit(1546466750.025:46): avc: denied { call } for pid=8847 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 [ 274.761368] ? should_fail+0x1e6/0xd22 22:05:50 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x5450, &(0x7f0000000240)) [ 274.761385] ? rcu_read_unlock_special+0x380/0x380 [ 274.761404] ? add_lock_to_list.isra.0+0x450/0x450 [ 274.761421] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 274.761434] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 274.761452] ? check_preemption_disabled+0x48/0x290 [ 274.765928] binder: 8847:8848 transaction failed 29201/-71, size 0-0 line 2816 [ 274.787805] __should_failslab+0x121/0x190 [ 274.787825] should_failslab+0x9/0x14 [ 274.787841] kmem_cache_alloc_node_trace+0x5a/0x720 [ 274.787858] ? __alloc_skb+0xf4/0x730 [ 274.787879] __kmalloc_node_track_caller+0x3d/0x70 [ 274.787896] __kmalloc_reserve.isra.0+0x40/0xe0 [ 274.787913] __alloc_skb+0x12d/0x730 [ 274.829251] ? skb_scrub_packet+0x440/0x440 [ 274.838055] ? kasan_check_read+0x11/0x20 [ 274.838072] ? do_raw_spin_unlock+0xa0/0x330 [ 274.838096] create_monitor_ctrl_open+0x20a/0x9e0 [ 274.873352] ? selinux_capable+0x36/0x40 [ 274.877427] ? send_monitor_note+0x480/0x480 [ 274.881895] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 274.887448] ? ns_capable_common+0x141/0x170 [ 274.891877] hci_sock_ioctl+0x68c/0x840 [ 274.895867] ? hci_sock_sendmsg+0x2730/0x2730 [ 274.900389] sock_do_ioctl+0xe2/0x400 [ 274.904202] ? do_recvmmsg+0xba0/0xba0 [ 274.906640] binder_alloc: binder_alloc_mmap_handler: 8847 20001000-20004000 already mapped failed -16 [ 274.908097] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 274.908126] ? lock_downgrade+0x910/0x910 [ 274.908142] ? kasan_check_read+0x11/0x20 [ 274.908167] sock_ioctl+0x32f/0x6c0 [ 274.908185] ? ___might_sleep+0x1e7/0x310 [ 274.908208] ? routing_ioctl+0x8d0/0x8d0 [ 274.925073] binder: BINDER_SET_CONTEXT_MGR already set [ 274.927352] ? __fget+0x499/0x710 [ 274.927377] ? __might_sleep+0x95/0x190 [ 274.927395] ? routing_ioctl+0x8d0/0x8d0 [ 274.927410] do_vfs_ioctl+0x107b/0x17d0 [ 274.927431] ? selinux_file_ioctl+0x511/0x720 [ 274.927454] ? selinux_file_ioctl+0x125/0x720 [ 274.933622] binder: 8847:8848 ioctl 40046207 0 returned -16 [ 274.935329] ? ioctl_preallocate+0x2f0/0x2f0 [ 274.935347] ? selinux_file_mprotect+0x620/0x620 [ 274.935363] ? __fget_light+0x2db/0x420 [ 274.935384] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 274.939799] binder_alloc: 8847: binder_alloc_buf, no vma [ 274.943572] ? fput+0x128/0x1a0 [ 274.943590] ? do_syscall_64+0x8c/0x800 [ 274.943610] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 274.943628] ? security_file_ioctl+0x93/0xc0 [ 274.943645] ksys_ioctl+0xab/0xd0 [ 274.943664] __x64_sys_ioctl+0x73/0xb0 [ 274.943683] do_syscall_64+0x1a3/0x800 [ 274.952342] binder: 8847:8848 got reply transaction with no transaction stack [ 274.952512] ? syscall_return_slowpath+0x5f0/0x5f0 [ 274.959191] binder: release 8847:8848 transaction 2 out, still active [ 274.960519] ? prepare_exit_to_usermode+0x232/0x3b0 [ 274.960543] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 274.960568] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.960581] RIP: 0033:0x457ec9 [ 274.960598] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 274.964852] binder: undelivered TRANSACTION_COMPLETE [ 274.969137] RSP: 002b:00007f6efee81c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 274.969152] RAX: ffffffffffffffda RBX: 00007f6efee81c90 RCX: 0000000000457ec9 [ 274.969162] RDX: 00000000200000c0 RSI: 00000000800448d4 RDI: 0000000000000004 [ 274.969171] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 274.969179] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6efee826d4 [ 274.969195] R13: 00000000004c31b6 R14: 00000000004d5938 R15: 0000000000000003 [ 275.040060] binder: undelivered TRANSACTION_ERROR: 29201 [ 275.049601] binder: 8847:8860 transaction failed 29189/-3, size 0-0 line 3035 [ 275.084594] binder: release 8847:8848 transaction 2 in, still active [ 275.110871] binder: send failed reply for transaction 2, target dead [ 275.131595] binder: 8847:8848 transaction failed 29201/-71, size 0-0 line 2801 [ 275.158490] binder: undelivered TRANSACTION_ERROR: 29201 [ 275.179605] binder: undelivered TRANSACTION_ERROR: 29189 22:05:52 executing program 2: pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) getgid() r0 = gettid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 22:05:52 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x4020940d, &(0x7f0000000240)) 22:05:52 executing program 5: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mq_open(&(0x7f0000000040)='/-+GPL-vboxnet0nodev-em1em0]\x00', 0x841, 0x0, 0x0) write(r1, &(0x7f0000000340), 0x10000014c) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) 22:05:52 executing program 3 (fault-call:1 fault-nth:2): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d4, &(0x7f00000000c0)="000002") 22:05:52 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x800443d2, &(0x7f0000000240)) 22:05:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x4d, 0x0, 0x0, 0xffffffffffffffff}, {0x6, 0x0, 0x0, 0xf2}]}, 0x10) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x10000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200), 0x4) sendmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x1ba, &(0x7f00000022c0)}}, {{0x0, 0x0, &(0x7f00000026c0), 0x0, &(0x7f0000002700)}}], 0x75a, 0x0) fstat(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) setresgid(r3, r4, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) gettid() r5 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r5, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f00000001c0)=0x10) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, &(0x7f0000000000)=0x20, 0x4) unshare(0x40000000) fstat(0xffffffffffffffff, &(0x7f0000000380)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x800000000000) perf_event_open(&(0x7f000001d000)={0x200000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x80000001ff) getrandom(&(0x7f0000000040)=""/59, 0xfe63, 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6) [ 277.163832] FAULT_INJECTION: forcing a failure. [ 277.163832] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 277.175689] CPU: 0 PID: 8870 Comm: syz-executor3 Not tainted 4.20.0+ #5 [ 277.182463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.191818] Call Trace: [ 277.194420] dump_stack+0x1db/0x2d0 [ 277.198060] ? dump_stack_print_info.cold+0x20/0x20 [ 277.203090] ? rcu_read_unlock_special+0x380/0x380 [ 277.208042] should_fail.cold+0xa/0x15 [ 277.211963] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 277.217175] ? unwind_get_return_address+0x61/0xa0 [ 277.222128] ? __save_stack_trace+0x8a/0xf0 [ 277.226517] should_fail_alloc_page+0x50/0x60 [ 277.231024] __alloc_pages_nodemask+0x323/0xdc0 [ 277.235709] ? save_stack+0x45/0xd0 [ 277.239339] ? kasan_kmalloc+0xcf/0xe0 [ 277.243225] ? kasan_slab_alloc+0xf/0x20 [ 277.247531] ? kmem_cache_alloc_node+0x144/0x710 [ 277.252306] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 277.257324] ? do_syscall_64+0x1a3/0x800 [ 277.261388] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.266935] ? kasan_check_read+0x11/0x20 [ 277.271086] ? should_fail+0x1e6/0xd22 [ 277.274976] ? rcu_read_unlock_special+0x380/0x380 [ 277.279956] ? trace_hardirqs_off+0xb8/0x310 [ 277.284388] cache_grow_begin+0x9c/0x8c0 [ 277.288453] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 277.293992] ? check_preemption_disabled+0x48/0x290 [ 277.299024] kmem_cache_alloc_node_trace+0x658/0x720 [ 277.304144] __kmalloc_node_track_caller+0x3d/0x70 [ 277.309095] __kmalloc_reserve.isra.0+0x40/0xe0 [ 277.313794] __alloc_skb+0x12d/0x730 [ 277.317518] ? skb_scrub_packet+0x440/0x440 [ 277.321878] ? kasan_check_read+0x11/0x20 [ 277.326039] ? do_raw_spin_unlock+0xa0/0x330 [ 277.330468] create_monitor_ctrl_open+0x20a/0x9e0 [ 277.335318] ? selinux_capable+0x36/0x40 [ 277.339386] ? send_monitor_note+0x480/0x480 [ 277.343799] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.349342] ? ns_capable_common+0x141/0x170 [ 277.353763] hci_sock_ioctl+0x68c/0x840 [ 277.357751] ? hci_sock_sendmsg+0x2730/0x2730 [ 277.362267] sock_do_ioctl+0xe2/0x400 [ 277.366072] ? do_recvmmsg+0xba0/0xba0 [ 277.369964] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.375510] ? lock_downgrade+0x910/0x910 [ 277.379667] ? kasan_check_read+0x11/0x20 [ 277.383828] sock_ioctl+0x32f/0x6c0 [ 277.387459] ? ___might_sleep+0x1e7/0x310 [ 277.391610] ? routing_ioctl+0x8d0/0x8d0 [ 277.395673] ? __fget+0x499/0x710 [ 277.399140] ? __might_sleep+0x95/0x190 [ 277.403119] ? routing_ioctl+0x8d0/0x8d0 [ 277.407181] do_vfs_ioctl+0x107b/0x17d0 [ 277.411169] ? selinux_file_ioctl+0x511/0x720 [ 277.415675] ? selinux_file_ioctl+0x125/0x720 [ 277.420173] ? ioctl_preallocate+0x2f0/0x2f0 [ 277.424586] ? selinux_file_mprotect+0x620/0x620 [ 277.429345] ? __fget_light+0x2db/0x420 [ 277.433329] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 277.438867] ? fput+0x128/0x1a0 [ 277.442153] ? do_syscall_64+0x8c/0x800 [ 277.446136] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.451677] ? security_file_ioctl+0x93/0xc0 [ 277.456124] ksys_ioctl+0xab/0xd0 [ 277.459581] __x64_sys_ioctl+0x73/0xb0 [ 277.463475] do_syscall_64+0x1a3/0x800 [ 277.467367] ? syscall_return_slowpath+0x5f0/0x5f0 [ 277.472303] ? prepare_exit_to_usermode+0x232/0x3b0 [ 277.477325] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 277.482178] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.487370] RIP: 0033:0x457ec9 [ 277.490594] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:05:52 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)=0x0) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000100)='\xfe\x92p*\x87\x8a\x9bL\x93o\x00\x00\x00') setns(r1, 0x8000000) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x24) ioctl$KVM_GET_DEVICE_ATTR(r2, 0x4018aee2, &(0x7f00000000c0)={0x0, 0x7, 0x4, &(0x7f0000000080)=0x5}) ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) [ 277.509495] RSP: 002b:00007f6efee81c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 277.517205] RAX: ffffffffffffffda RBX: 00007f6efee81c90 RCX: 0000000000457ec9 [ 277.524475] RDX: 00000000200000c0 RSI: 00000000800448d4 RDI: 0000000000000004 [ 277.531752] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 277.539021] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6efee826d4 [ 277.546288] R13: 00000000004c31b6 R14: 00000000004d5938 R15: 0000000000000003 22:05:53 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x8940, &(0x7f0000000240)) 22:05:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000015ff8)) mmap(&(0x7f0000abb000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 22:05:53 executing program 2: pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) getgid() r0 = gettid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 22:05:53 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x89a1, &(0x7f0000000240)) 22:05:53 executing program 3 (fault-call:1 fault-nth:3): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d4, &(0x7f00000000c0)="000002") [ 277.830993] IPVS: ftp: loaded support on port[0] = 21 22:05:53 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x8980, &(0x7f0000000240)) 22:05:53 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x0, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000080)='@/em1vboxnet1vboxnet0em0\x00', 0x19) ioctl(r0, 0x8000000000009382, 0x0) accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14, 0x0) fallocate(r0, 0x40, 0x0, 0x3) 22:05:53 executing program 5: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mq_open(&(0x7f0000000040)='/-+GPL-vboxnet0nodev-em1em0]\x00', 0x841, 0x0, 0x0) write(r2, &(0x7f0000000340), 0x10000014c) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) 22:05:53 executing program 2: pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) getgid() r0 = gettid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 22:05:53 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x894c, &(0x7f0000000240)) [ 278.278949] IPVS: ftp: loaded support on port[0] = 21 22:05:55 executing program 2: pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) getgid() r0 = gettid() clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 22:05:55 executing program 1: io_setup(0x7f, &(0x7f0000000140)=0x0) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) io_submit(r0, 0x20000000000000ae, &(0x7f0000000b00)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) r2 = socket(0x9, 0x80003, 0x4) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000080), 0x4) 22:05:55 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x8941, &(0x7f0000000240)) 22:05:55 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d4, &(0x7f00000000c0)="000002") 22:05:55 executing program 5: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mq_open(&(0x7f0000000040)='/-+GPL-vboxnet0nodev-em1em0]\x00', 0x841, 0x0, 0x0) write(r2, &(0x7f0000000340), 0x10000014c) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) 22:05:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xfffffffffffffe01, &(0x7f0000000080)="0adc424ed7b3") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="240000001a0007011dfffd940101830020200a0009000000060000007fffffff0d00ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47a6268e3406cf055d90f15a3", 0x4c}], 0x1}, 0x0) getsockopt(r1, 0x1, 0x3, &(0x7f0000000140)=""/114, &(0x7f0000000040)=0x72) 22:05:55 executing program 2: pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) getgid() r0 = gettid() clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 22:05:55 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x8980, &(0x7f00000000c0)="000002") [ 280.505962] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. 22:05:55 executing program 2: pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) getgid() r0 = gettid() clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 22:05:55 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x8904, &(0x7f0000000240)) 22:05:56 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r0, 0x104, 0x3, &(0x7f0000000040)=0x7ff, 0xff6b) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='security.capability\x00', &(0x7f0000000200)=@v3={0x3000000, [{0x1, 0x8}, {0x1}], r1}, 0xffffff11, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='bpf\x00', 0x11, &(0x7f0000000280)={[{@mode={'mode', 0x3d, 0x80}}, {@mode={'mode', 0x3d, 0xa1}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x101}}, {@mode={'mode', 0x3d, 0x401}}, {@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x5}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}) syz_init_net_socket$ax25(0x3, 0x7, 0xcd) [ 280.633523] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. 22:05:56 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x40049409, &(0x7f00000000c0)="000002") 22:05:56 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x40087602, &(0x7f0000000240)) 22:05:56 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x4000000000005, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0x9205, 0x0) 22:05:56 executing program 2: pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) getgid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, 0x0) 22:05:56 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000040)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getegid() preadv(r0, &(0x7f00000017c0), 0x1a4, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000100)={0xffffffff, 0x8, [0xffff, 0x0]}) 22:05:56 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x8981, &(0x7f0000000240)) 22:05:56 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d3, &(0x7f00000000c0)="000002") 22:05:56 executing program 2: pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) getgid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, 0x0) 22:05:56 executing program 5: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mq_open(&(0x7f0000000040)='/-+GPL-vboxnet0nodev-em1em0]\x00', 0x841, 0x0, 0x0) write(r2, &(0x7f0000000340), 0x10000014c) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) 22:05:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x9100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x400000000005, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000540)={0x2, 0x70, 0x0, 0x1, 0x9, 0x3f, 0x0, 0x5, 0x1200, 0x1, 0x4, 0x938, 0x5, 0x7, 0x1ff, 0xf527, 0x5, 0x5, 0x761, 0x14a38a7a, 0x0, 0x7, 0x80, 0xffffffff, 0x0, 0x1, 0x2, 0x0, 0xd285, 0x1, 0x8, 0x5, 0x7, 0x1, 0x2, 0x2, 0x3f, 0xffffffff, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000440), 0x8}, 0x1000, 0x6, 0x1f, 0x5, 0x8d8, 0x59b, 0x2}, r2, 0x5, r0, 0x2) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x894c, &(0x7f0000000280)={r1}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={0xffffffffffffffff, r0, 0x0, 0x15, &(0x7f0000000500)='\\cgroup-/\'GPLwlan0{}\x00'}, 0x30) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r0, 0xfffffffffffffe5a, &(0x7f0000000700)={0x0, 0x0}}, 0x10) recvmsg(r3, &(0x7f0000003840)={&(0x7f0000003600)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000003740)=[{&(0x7f0000003680)=""/172, 0xac}], 0x1, &(0x7f0000003780)=""/131, 0x83, 0x7fffffff}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000003880)={0x11, 0x7, &(0x7f00000002c0)=ANY=[@ANYBLOB="95000000000000003fe56e9be55e1a70f6558c8d070b2d1455cde3d5adf430185e74dda78e66007f54928f74c4215610ca62fb845216bd9c896bfe9a97362b"], 0x0, 0x8885, 0x0, 0x0, 0x0, 0x1, [], r6, 0x7}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={r4, r0, 0x0, 0x12, &(0x7f00000006c0)='./cgroup.net/syz1\x00', r5}, 0x30) r7 = gettid() r8 = perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0xfffffffffffffff7, 0x9, 0x8f16, 0x7, 0x0, 0x9, 0x800, 0x4, 0x7fffffff, 0x1, 0x4, 0x1ff, 0x1f, 0x1, 0x101, 0x3, 0x4, 0x7f, 0x297, 0x3, 0x1, 0x0, 0x605, 0x0, 0x80000001, 0x401, 0x7, 0x4, 0x8b3d, 0xfffffffffffffff7, 0x1, 0x8, 0x8000, 0xfffffffffffffff8, 0xfff, 0x4, 0x0, 0x6, 0x7, @perf_bp={&(0x7f0000000040), 0x1}, 0x2, 0x3fb, 0x6, 0x6, 0x100000000, 0x4, 0x9}, r7, 0x1, r0, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup/syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0xc0189436, &(0x7f0000000200)={0x0, 0x70, 0x2000000000, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}) openat$cgroup_ro(r1, &(0x7f00000003c0)='cpuacct.usage_user\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.net/syz1\x00\xcc\xff%s\xf8.\xd3\xfdx\xcb]k\xa9\x01\xdc\xf8\x06\x15\x80\x04m\x9b\x11D\xbb\x97\xddC\xa9@4\x84(\xee\xf7W\xd3<\x1d&z\\\xd3\x11\x9cv\x18?\xaa\xa1\xf0\xb8\xe2\x80e\xf2\xdaE\r\xa3\x8c=\xf8\xb4\xb9\xacd-\xeb\x05\xb5\xb3\x15l8kp%~\xba\x98`\x8b\x03\x15;\x984<\v\x9a7\xa8\xb4\xbfF\x92\xa9\xa8\x16\x01\x90\xb96\xb0\xbbcU\xa4\xf1\x83y\r_C\xef^}k\x1a\xf9w\xd3SwD\xf5v\xf0{\xc3\x95\xdaL\x1fBR\xeb\x133\xa6\x85\x04(7\xcc9]\xc6\xee=\x9fAX\xb9', 0x200002, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000400)=0x5, 0x4) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r9, 0x50, &(0x7f0000000840)}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.net/syz1\xeb', 0x1ff) r10 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ID(r10, 0x80082407, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r11, 0x40286608, 0x20000001) 22:05:56 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x2, 0x4000) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f0000000500)={'ifb0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x200}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', r1}, 0x10) r4 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x2, 0x2) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x200000, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x40000, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0xa0080, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000340)={0x0, 0xff}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f00000003c0)=@assoc_value={r6, 0x1}, &(0x7f0000000400)=0x8) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x1, 0x0, 0x0, 0x0, 0x840}}) openat$cgroup_procs(r5, &(0x7f0000000440)='tasks\x00', 0x2, 0x0) socket$isdn_base(0x22, 0x3, 0x0) 22:05:56 executing program 2: pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) getgid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r0 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, 0x0) 22:05:56 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x4b49, &(0x7f00000000c0)="000002") 22:05:56 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x5421, &(0x7f0000000240)) [ 281.383775] audit: type=1400 audit(1546466756.745:47): avc: denied { prog_load } for pid=9004 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 22:05:56 executing program 2: pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = gettid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 22:05:57 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x5452, &(0x7f0000000240)) 22:05:57 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0xc0045878, &(0x7f00000000c0)="000002") 22:05:57 executing program 1: r0 = perf_event_open(&(0x7f0000000680)={0x3, 0x70, 0x1000, 0x10, 0x5, 0x9, 0x0, 0xff, 0x22, 0x4, 0x1, 0x0, 0x40, 0xffffffff00000000, 0x101, 0x6, 0xb740, 0x0, 0x9, 0x4, 0x8, 0x1000, 0x10001, 0xfffffffffffffffa, 0xffffffff80000001, 0x0, 0xff, 0x1ff, 0x8, 0x5, 0x401, 0x7, 0x7, 0xb10, 0xfff, 0x4, 0x1, 0x4, 0x0, 0x204, 0x0, @perf_bp={&(0x7f0000000640), 0x8}, 0xc009, 0x5, 0x1d, 0xf, 0x3b6, 0x6, 0x1}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x40e2}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/dev_snmp6\x00') prctl$PR_SET_ENDIAN(0x14, 0x3) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000040)={0x9, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}, {}, {}]}) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x5, 0x0) pwritev(r2, &(0x7f00000014c0)=[{&(0x7f00000000c0)="1e", 0x1}], 0x1, 0x0) 22:05:57 executing program 2: pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) getgid() r0 = gettid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) [ 281.686993] EXT4-fs warning (device sda1): ext4_group_add:1636: No reserved GDT blocks, can't resize 22:05:57 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x8902, &(0x7f00000000c0)="000002") 22:05:57 executing program 4: pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = gettid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 22:05:57 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x40086602, &(0x7f0000000240)) 22:05:57 executing program 5: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mq_open(&(0x7f0000000040)='/-+GPL-vboxnet0nodev-em1em0]\x00', 0x841, 0x0, 0x0) write(r2, &(0x7f0000000340), 0x10000014c) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) 22:05:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="2800000019000102298ddcfbb400000000000000001d01000014000900ff010000000000000000210000000001407e307c7b037c3e1330472cd1b4383e8b"], 0x28}}, 0x0) 22:05:57 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x5451, &(0x7f00000000c0)="000002") 22:05:57 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0xc0045878, &(0x7f0000000240)) 22:05:57 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x8901, &(0x7f00000000c0)="000002") 22:05:57 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) r1 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x6, 0x400) accept$inet6(r1, 0x0, &(0x7f0000000280)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x5ff, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x5}, &(0x7f0000000140)=0x8) ioctl$NBD_SET_SOCK(r1, 0xab00, r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x80000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000380)={&(0x7f0000000640)=ANY=[@ANYBLOB="a528f12a0b9cd318e9", @ANYRES16=r4, @ANYBLOB="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"], 0x184}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000180)={r3, 0x1f}, &(0x7f0000000200)=0x8) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x20001000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r6 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000080), 0x10) ioctl$PERF_EVENT_IOC_DISABLE(r6, 0x2401, 0x3c) ioctl$KDGETMODE(r0, 0x5437, 0x0) 22:05:57 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x4b49, &(0x7f0000000240)) 22:05:57 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448cc, &(0x7f00000000c0)="000002") [ 282.488775] Unknown ioctl 9217 [ 282.560582] Unknown ioctl 9217 22:06:00 executing program 2: pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) getgid() r0 = gettid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 22:06:00 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c9, &(0x7f0000000240)) 22:06:00 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c9, &(0x7f0000000240)) 22:06:00 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x40086602, &(0x7f00000000c0)="000002") 22:06:00 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) r1 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x6, 0x400) accept$inet6(r1, 0x0, &(0x7f0000000280)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x5ff, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x5}, &(0x7f0000000140)=0x8) ioctl$NBD_SET_SOCK(r1, 0xab00, r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x80000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000380)={&(0x7f0000000640)=ANY=[@ANYBLOB="a528f12a0b9cd318e9", @ANYRES16=r4, @ANYBLOB="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"], 0x184}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000180)={r3, 0x1f}, &(0x7f0000000200)=0x8) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x20001000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r6 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000080), 0x10) ioctl$PERF_EVENT_IOC_DISABLE(r6, 0x2401, 0x3c) ioctl$KDGETMODE(r0, 0x5437, 0x0) 22:06:00 executing program 5: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mq_open(&(0x7f0000000040)='/-+GPL-vboxnet0nodev-em1em0]\x00', 0x841, 0x0, 0x0) write(r2, &(0x7f0000000340), 0x10000014c) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x14, 0x0, 0x0) syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) 22:06:00 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x8983, &(0x7f0000000240)) 22:06:00 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x894c, &(0x7f00000000c0)="000002") 22:06:00 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x2, &(0x7f0000000240)) [ 285.278400] Unknown ioctl 9217 22:06:00 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) r1 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x6, 0x400) accept$inet6(r1, 0x0, &(0x7f0000000280)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x5ff, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x5}, &(0x7f0000000140)=0x8) ioctl$NBD_SET_SOCK(r1, 0xab00, r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x80000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000380)={&(0x7f0000000640)=ANY=[@ANYBLOB="a528f12a0b9cd318e9", @ANYRES16=r4, @ANYBLOB="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"], 0x184}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000180)={r3, 0x1f}, &(0x7f0000000200)=0x8) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x20001000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r6 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000080), 0x10) ioctl$PERF_EVENT_IOC_DISABLE(r6, 0x2401, 0x3c) ioctl$KDGETMODE(r0, 0x5437, 0x0) 22:06:00 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c9, &(0x7f0000000240)) 22:06:00 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x40049409, &(0x7f0000000240)) [ 285.459873] Unknown ioctl 9217 22:06:03 executing program 2: pipe(&(0x7f0000000140)) getgid() r0 = gettid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 22:06:03 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0xc020660b, &(0x7f00000000c0)="000002") 22:06:03 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c9, &(0x7f0000000240)) 22:06:03 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) r1 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x6, 0x400) accept$inet6(r1, 0x0, &(0x7f0000000280)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x5ff, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x5}, &(0x7f0000000140)=0x8) ioctl$NBD_SET_SOCK(r1, 0xab00, r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x80000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000380)={&(0x7f0000000640)=ANY=[@ANYBLOB="a528f12a0b9cd318e9", @ANYRES16=r4, @ANYBLOB="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"], 0x184}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000180)={r3, 0x1f}, &(0x7f0000000200)=0x8) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x20001000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r6 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000080), 0x10) ioctl$PERF_EVENT_IOC_DISABLE(r6, 0x2401, 0x3c) ioctl$KDGETMODE(r0, 0x5437, 0x0) 22:06:03 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0xc0045878, &(0x7f0000000240)) 22:06:03 executing program 5: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mq_open(&(0x7f0000000040)='/-+GPL-vboxnet0nodev-em1em0]\x00', 0x841, 0x0, 0x0) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) 22:06:03 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0xc0189436, &(0x7f0000000240)) 22:06:03 executing program 4: ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x400443c9, &(0x7f0000000240)) 22:06:03 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x5460, &(0x7f00000000c0)="000002") [ 287.937342] Unknown ioctl 9217 22:06:03 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) r1 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x6, 0x400) accept$inet6(r1, 0x0, &(0x7f0000000280)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x5ff, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x5}, &(0x7f0000000140)=0x8) ioctl$NBD_SET_SOCK(r1, 0xab00, r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x80000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000380)={&(0x7f0000000640)=ANY=[@ANYBLOB="a528f12a0b9cd318e9", @ANYRES16=r4, @ANYBLOB="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"], 0x184}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000180)={r3, 0x1f}, &(0x7f0000000200)=0x8) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x20001000008912, &(0x7f0000000040)="0af51f023c123f3188a070") openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000080), 0x10) ioctl$KDGETMODE(r0, 0x5437, 0x0) 22:06:03 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x541b, &(0x7f0000000240)) 22:06:03 executing program 2: pipe(&(0x7f0000000140)) getgid() r0 = gettid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 22:06:03 executing program 4: ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x400443c9, &(0x7f0000000240)) 22:06:03 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x8983, &(0x7f00000000c0)="000002") 22:06:03 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) getgid() r0 = gettid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 22:06:03 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) r1 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x6, 0x400) accept$inet6(r1, 0x0, &(0x7f0000000280)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x5ff, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x5}, &(0x7f0000000140)=0x8) ioctl$NBD_SET_SOCK(r1, 0xab00, r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x80000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000380)={&(0x7f0000000640)=ANY=[@ANYBLOB="a528f12a0b9cd318e9", @ANYRES16=r4, @ANYBLOB="00082cbd7000fddbdf2505000000600005004c000200080001001c000000080003000500000008000400080000000800030005000000080001001c0000000800030005000000080001000f0000000800030000800000080001000f00000008000100756470000800010075647000640004000c00010073797a31000000001400010062726f6164636173742d6c696e6b00001400010062726f6164636173742d6c696e6b00002c000700080001001f000000080002000101000008000400060000000800010018000000080001000500000094000100100001006574683a627269646765300024000200080003000900000008000300c164b9610800040000000000080003003f0000000800030006000000080003000400000044000400200001000a004e2101000000ff020000000000000000000000000001ff0f0000200002000a004e2209000000ff020000000000000000000000000001020000000800030005000000180004001400010062726f6164636173742d6c696e6b0000"], 0x184}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000180)={r3, 0x1f}, &(0x7f0000000200)=0x8) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x20001000008912, &(0x7f0000000040)="0af51f023c123f3188a070") openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x0, 0x0) ioctl$KDGETMODE(r0, 0x5437, 0x0) 22:06:03 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x8902, &(0x7f0000000240)) 22:06:04 executing program 5: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) pipe(&(0x7f00000005c0)={0xffffffffffffffff}) mq_open(&(0x7f0000000040)='/-+GPL-vboxnet0nodev-em1em0]\x00', 0x841, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) 22:06:04 executing program 4: ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x400443c9, &(0x7f0000000240)) 22:06:04 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448dd, &(0x7f00000000c0)="000002") 22:06:04 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x8982, &(0x7f0000000240)) 22:06:04 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) r1 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x6, 0x400) accept$inet6(r1, 0x0, &(0x7f0000000280)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x5ff, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x5}, &(0x7f0000000140)=0x8) ioctl$NBD_SET_SOCK(r1, 0xab00, r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x80000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000380)={&(0x7f0000000640)=ANY=[@ANYBLOB="a528f12a0b9cd318e9", @ANYRES16=r4, @ANYBLOB="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"], 0x184}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000180)={r3, 0x1f}, &(0x7f0000000200)=0x8) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x20001000008912, &(0x7f0000000040)="0af51f023c123f3188a070") ioctl$KDGETMODE(r0, 0x5437, 0x0) 22:06:04 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) getgid() r0 = gettid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 22:06:04 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x400443c9, &(0x7f0000000240)) 22:06:04 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x8901, &(0x7f0000000240)) 22:06:04 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0xc0189436, &(0x7f00000000c0)="000002") 22:06:04 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) r1 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x6, 0x400) accept$inet6(r1, 0x0, &(0x7f0000000280)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x5ff, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x5}, &(0x7f0000000140)=0x8) ioctl$NBD_SET_SOCK(r1, 0xab00, r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x80000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000380)={&(0x7f0000000640)=ANY=[@ANYBLOB="a528f12a0b9cd318e9", @ANYRES16=r4, @ANYBLOB="00082cbd7000fddbdf2505000000600005004c000200080001001c000000080003000500000008000400080000000800030005000000080001001c0000000800030005000000080001000f0000000800030000800000080001000f00000008000100756470000800010075647000640004000c00010073797a31000000001400010062726f6164636173742d6c696e6b00001400010062726f6164636173742d6c696e6b00002c000700080001001f000000080002000101000008000400060000000800010018000000080001000500000094000100100001006574683a627269646765300024000200080003000900000008000300c164b9610800040000000000080003003f0000000800030006000000080003000400000044000400200001000a004e2101000000ff020000000000000000000000000001ff0f0000200002000a004e2209000000ff020000000000000000000000000001020000000800030005000000180004001400010062726f6164636173742d6c696e6b0000"], 0x184}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000180)={r3, 0x1f}, &(0x7f0000000200)=0x8) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KDGETMODE(r0, 0x5437, 0x0) 22:06:04 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) getgid() r0 = gettid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 22:06:04 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x800443d3, &(0x7f0000000240)) 22:06:04 executing program 5: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) pipe(&(0x7f00000005c0)={0xffffffffffffffff}) mq_open(&(0x7f0000000040)='/-+GPL-vboxnet0nodev-em1em0]\x00', 0x841, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) 22:06:04 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x400443c9, &(0x7f0000000240)) 22:06:04 executing program 2: pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) getgid() r0 = gettid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 22:06:04 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x5452, &(0x7f00000000c0)="000002") 22:06:04 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) r1 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x6, 0x400) accept$inet6(r1, 0x0, &(0x7f0000000280)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x5ff, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x5}, &(0x7f0000000140)=0x8) ioctl$NBD_SET_SOCK(r1, 0xab00, r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x80000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000380)={&(0x7f0000000640)=ANY=[@ANYBLOB="a528f12a0b9cd318e9", @ANYRES16=r4, @ANYBLOB="00082cbd7000fddbdf2505000000600005004c000200080001001c000000080003000500000008000400080000000800030005000000080001001c0000000800030005000000080001000f0000000800030000800000080001000f00000008000100756470000800010075647000640004000c00010073797a31000000001400010062726f6164636173742d6c696e6b00001400010062726f6164636173742d6c696e6b00002c000700080001001f000000080002000101000008000400060000000800010018000000080001000500000094000100100001006574683a627269646765300024000200080003000900000008000300c164b9610800040000000000080003003f0000000800030006000000080003000400000044000400200001000a004e2101000000ff020000000000000000000000000001ff0f0000200002000a004e2209000000ff020000000000000000000000000001020000000800030005000000180004001400010062726f6164636173742d6c696e6b0000"], 0x184}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000180)={r3, 0x1f}, &(0x7f0000000200)=0x8) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KDGETMODE(r0, 0x5437, 0x0) 22:06:04 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0xc020660b, &(0x7f0000000240)) 22:06:04 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x4b47, &(0x7f00000000c0)="000002") 22:06:05 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x400443c9, &(0x7f0000000240)) 22:06:05 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x5460, &(0x7f0000000240)) 22:06:05 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) r1 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x6, 0x400) accept$inet6(r1, 0x0, &(0x7f0000000280)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x5ff, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x5}, &(0x7f0000000140)=0x8) ioctl$NBD_SET_SOCK(r1, 0xab00, r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x80000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000380)={&(0x7f0000000640)=ANY=[@ANYBLOB="a528f12a0b9cd318e9", @ANYRES16=r4, @ANYBLOB="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"], 0x184}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000180)={r3, 0x1f}, &(0x7f0000000200)=0x8) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KDGETMODE(r0, 0x5437, 0x0) 22:06:05 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448f0, &(0x7f00000000c0)="000002") 22:06:05 executing program 2: pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) getgid() r0 = gettid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 22:06:05 executing program 5: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) 22:06:05 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c9, 0x0) 22:06:05 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x80087601, &(0x7f0000000240)) 22:06:05 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0xc0045878, &(0x7f00000000c0)="000002") 22:06:05 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) r1 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x6, 0x400) accept$inet6(r1, 0x0, &(0x7f0000000280)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x5ff, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x5}, &(0x7f0000000140)=0x8) ioctl$NBD_SET_SOCK(r1, 0xab00, r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x80000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000380)={&(0x7f0000000640)=ANY=[@ANYBLOB="a528f12a0b9cd318e9", @ANYRES16=r4, @ANYBLOB="00082cbd7000fddbdf2505000000600005004c000200080001001c000000080003000500000008000400080000000800030005000000080001001c0000000800030005000000080001000f0000000800030000800000080001000f00000008000100756470000800010075647000640004000c00010073797a31000000001400010062726f6164636173742d6c696e6b00001400010062726f6164636173742d6c696e6b00002c000700080001001f000000080002000101000008000400060000000800010018000000080001000500000094000100100001006574683a627269646765300024000200080003000900000008000300c164b9610800040000000000080003003f0000000800030006000000080003000400000044000400200001000a004e2101000000ff020000000000000000000000000001ff0f0000200002000a004e2209000000ff020000000000000000000000000001020000000800030005000000180004001400010062726f6164636173742d6c696e6b0000"], 0x184}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000180)={r3, 0x1f}, &(0x7f0000000200)=0x8) ioctl(0xffffffffffffffff, 0x20001000008912, &(0x7f0000000040)="0af51f023c123f3188a070") ioctl$KDGETMODE(r0, 0x5437, 0x0) 22:06:05 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c9, 0x0) 22:06:05 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x89a0, &(0x7f0000000240)) 22:06:05 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x8903, &(0x7f00000000c0)="000002") 22:06:05 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) r1 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x6, 0x400) accept$inet6(r1, 0x0, &(0x7f0000000280)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x5ff, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x5}, &(0x7f0000000140)=0x8) ioctl$NBD_SET_SOCK(r1, 0xab00, r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x80000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000380)={&(0x7f0000000640)=ANY=[@ANYBLOB="a528f12a0b9cd318e9", @ANYRES16=r4, @ANYBLOB="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"], 0x184}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000180)={r3, 0x1f}, &(0x7f0000000200)=0x8) ioctl(0xffffffffffffffff, 0x20001000008912, &(0x7f0000000040)="0af51f023c123f3188a070") ioctl$KDGETMODE(r0, 0x5437, 0x0) 22:06:06 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c9, 0x0) 22:06:06 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x8904, &(0x7f00000000c0)="000002") 22:06:08 executing program 2: pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) getgid() r0 = gettid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 22:06:08 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) r1 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x6, 0x400) accept$inet6(r1, 0x0, &(0x7f0000000280)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x5ff, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x5}, &(0x7f0000000140)=0x8) ioctl$NBD_SET_SOCK(r1, 0xab00, r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x80000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000380)={&(0x7f0000000640)=ANY=[@ANYBLOB="a528f12a0b9cd318e9", @ANYRES16=r4, @ANYBLOB="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"], 0x184}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000180)={r3, 0x1f}, &(0x7f0000000200)=0x8) ioctl(0xffffffffffffffff, 0x20001000008912, &(0x7f0000000040)="0af51f023c123f3188a070") ioctl$KDGETMODE(r0, 0x5437, 0x0) 22:06:08 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x5451, &(0x7f0000000240)) 22:06:08 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x4020940d, &(0x7f00000000c0)="000002") 22:06:08 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x800443d3, &(0x7f0000000240)) 22:06:08 executing program 5: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) mq_open(&(0x7f0000000040)='/-+GPL-vboxnet0nodev-em1em0]\x00', 0x841, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) 22:06:08 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x80086601, &(0x7f00000000c0)="000002") 22:06:08 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x800443d3, &(0x7f0000000240)) 22:06:08 executing program 5: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) userfaultfd(0x80800) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mq_open(&(0x7f0000000040)='/-+GPL-vboxnet0nodev-em1em0]\x00', 0x841, 0x0, 0x0) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) 22:06:08 executing program 2: pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) getgid() r0 = gettid() clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 22:06:08 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) r1 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x6, 0x400) accept$inet6(r1, 0x0, &(0x7f0000000280)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x5ff, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x5}, &(0x7f0000000140)=0x8) ioctl$NBD_SET_SOCK(r1, 0xab00, r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x80000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000380)={&(0x7f0000000640)=ANY=[@ANYBLOB="a528f12a0b9cd318e9", @ANYRES16=r2, @ANYBLOB="00082cbd7000fddbdf2505000000600005004c000200080001001c000000080003000500000008000400080000000800030005000000080001001c0000000800030005000000080001000f0000000800030000800000080001000f00000008000100756470000800010075647000640004000c00010073797a31000000001400010062726f6164636173742d6c696e6b00001400010062726f6164636173742d6c696e6b00002c000700080001001f000000080002000101000008000400060000000800010018000000080001000500000094000100100001006574683a627269646765300024000200080003000900000008000300c164b9610800040000000000080003003f0000000800030006000000080003000400000044000400200001000a004e2101000000ff020000000000000000000000000001ff0f0000200002000a004e2209000000ff020000000000000000000000000001020000000800030005000000180004001400010062726f6164636173742d6c696e6b0000"], 0x184}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x20001000008912, &(0x7f0000000040)="0af51f023c123f3188a070") ioctl$KDGETMODE(r0, 0x5437, 0x0) 22:06:08 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000240)={0xffffffffffffffff, 0x100000000000000}) 22:06:08 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x8982, &(0x7f00000000c0)="000002") 22:06:08 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x800443d3, &(0x7f0000000240)) 22:06:08 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000240)={0xffffffffffffffff, 0x1000000}) 22:06:08 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) r1 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x6, 0x400) accept$inet6(r1, 0x0, &(0x7f0000000280)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x5ff, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x5}, &(0x7f0000000140)=0x8) ioctl$NBD_SET_SOCK(r1, 0xab00, r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x80000, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x20001000008912, &(0x7f0000000040)="0af51f023c123f3188a070") ioctl$KDGETMODE(r0, 0x5437, 0x0) 22:06:08 executing program 2: pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) getgid() r0 = gettid() clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 22:06:08 executing program 4: ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x800443d3, &(0x7f0000000240)) 22:06:08 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000240)) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x4000) getsockopt$inet6_int(r1, 0x29, 0xff, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f00000000c0)) 22:06:08 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x8981, &(0x7f00000000c0)="000002") 22:06:09 executing program 5: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) userfaultfd(0x80800) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mq_open(&(0x7f0000000040)='/-+GPL-vboxnet0nodev-em1em0]\x00', 0x841, 0x0, 0x0) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) 22:06:09 executing program 2: pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) getgid() r0 = gettid() clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 22:06:09 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) r1 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x6, 0x400) accept$inet6(r1, 0x0, &(0x7f0000000280)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x5ff, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x5}, &(0x7f0000000140)=0x8) ioctl$NBD_SET_SOCK(r1, 0xab00, r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x80000, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x20001000008912, &(0x7f0000000040)="0af51f023c123f3188a070") ioctl$KDGETMODE(r0, 0x5437, 0x0) 22:06:09 executing program 4: ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x800443d3, &(0x7f0000000240)) 22:06:09 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x80087601, &(0x7f00000000c0)="000002") 22:06:09 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000240)) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) bind$tipc(r1, &(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x1, {0x41, 0x4, 0x3}}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) 22:06:09 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x5421, &(0x7f00000000c0)="000002") 22:06:09 executing program 2: pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) getgid() r0 = gettid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 22:06:09 executing program 4: ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x800443d3, &(0x7f0000000240)) 22:06:09 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000240)) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) getsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000080)=0x2, &(0x7f0000000100)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x1, 0x0) ioctl$VT_OPENQRY(r2, 0x5600, &(0x7f0000000040)) prctl$PR_MCE_KILL(0x21, 0x1, 0x1) 22:06:09 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) r1 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x6, 0x400) accept$inet6(r1, 0x0, &(0x7f0000000280)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x5ff, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x5}, &(0x7f0000000140)=0x8) ioctl$NBD_SET_SOCK(r1, 0xab00, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x20001000008912, &(0x7f0000000040)="0af51f023c123f3188a070") ioctl$KDGETMODE(r0, 0x5437, 0x0) 22:06:09 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x8940, &(0x7f00000000c0)="000002") 22:06:09 executing program 5: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) userfaultfd(0x80800) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mq_open(&(0x7f0000000040)='/-+GPL-vboxnet0nodev-em1em0]\x00', 0x841, 0x0, 0x0) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) 22:06:09 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x800443d3, &(0x7f0000000240)) 22:06:09 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000000)=0x6400) fcntl$setstatus(r0, 0x4, 0x4400) fgetxattr(r0, &(0x7f0000000040)=@known='trusted.syz\x00', &(0x7f0000000080)=""/231, 0xe7) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000240)) 22:06:09 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) r1 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x6, 0x400) accept$inet6(r1, 0x0, &(0x7f0000000280)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x5ff, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x5}, &(0x7f0000000140)=0x8) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x20001000008912, &(0x7f0000000040)="0af51f023c123f3188a070") ioctl$KDGETMODE(r0, 0x5437, 0x0) 22:06:09 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448e4, &(0x7f00000000c0)="000002") 22:06:09 executing program 2: pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) getgid() r0 = gettid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 22:06:09 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x800443d3, &(0x7f0000000240)) 22:06:09 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000240)) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x78) 22:06:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) r1 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x6, 0x400) accept$inet6(r1, 0x0, &(0x7f0000000280)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x5ff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x20001000008912, &(0x7f0000000040)="0af51f023c123f3188a070") ioctl$KDGETMODE(r0, 0x5437, 0x0) 22:06:10 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x40087602, &(0x7f00000000c0)="000002") 22:06:10 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x800443d3, &(0x7f0000000240)) 22:06:10 executing program 2: pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) getgid() r0 = gettid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 22:06:10 executing program 5: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mq_open(&(0x7f0000000040)='/-+GPL-vboxnet0nodev-em1em0]\x00', 0x841, 0x0, 0x0) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) 22:06:10 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x800) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000240)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x40040, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000040)={0x2d, 0x6, 0x0, {0x6, 0x3, 0x4, 0x0, '^em0'}}, 0x2d) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x46, 0x80) 22:06:10 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x2, &(0x7f00000000c0)="000002") 22:06:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) r1 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x6, 0x400) accept$inet6(r1, 0x0, &(0x7f0000000280)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x20001000008912, &(0x7f0000000040)="0af51f023c123f3188a070") ioctl$KDGETMODE(r0, 0x5437, 0x0) 22:06:10 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x800443d3, 0x0) 22:06:10 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x89a0, &(0x7f00000000c0)="000002") 22:06:10 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x800443d3, 0x0) 22:06:10 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) init_module(&(0x7f0000000000)='\'mime_typewlan0,\x00', 0x11, &(0x7f0000000040)='\x00') ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000240)) 22:06:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x6, 0x400) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x20001000008912, &(0x7f0000000040)="0af51f023c123f3188a070") ioctl$KDGETMODE(r0, 0x5437, 0x0) 22:06:10 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x800443d3, 0x0) 22:06:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x20001000008912, &(0x7f0000000040)="0af51f023c123f3188a070") ioctl$KDGETMODE(r0, 0x5437, 0x0) 22:06:13 executing program 2: pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) getgid() r0 = gettid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 22:06:13 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x541b, &(0x7f00000000c0)="000002") 22:06:13 executing program 4: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) userfaultfd(0x80800) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mq_open(&(0x7f0000000040)='/-+GPL-vboxnet0nodev-em1em0]\x00', 0x841, 0x0, 0x0) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) 22:06:13 executing program 0: r0 = dup(0xffffffffffffffff) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f0000000740)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x60020}, 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2e4, r1, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x3c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3f}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x200}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0xc0, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ffc00}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x921b}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd72}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x101}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3f9a0a1c}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x10000}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x81}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_NODE={0x3c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9772}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xa18}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_MEDIA={0x5c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa0}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x93}]}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x80000001}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK={0xac, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x2e4}, 0x1, 0x0, 0x0, 0x40000}, 0x4000010) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80000, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') clock_gettime(0x7, &(0x7f0000000280)) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x400, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xdc, r3, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0xc8, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xb4}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @local}}, {0x14, 0x2, @in={0x2, 0x4e24, @rand_addr=0x80000000}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'bridge_slave_0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r4, 0x400443c8, &(0x7f0000000080)) fcntl$addseals(r4, 0x409, 0xf) getsockname$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000300)=0x1c) 22:06:13 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x20001000008912, &(0x7f0000000040)="0af51f023c123f3188a070") ioctl$KDGETMODE(r0, 0x5437, 0x0) 22:06:13 executing program 5: r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mq_open(&(0x7f0000000040)='/-+GPL-vboxnet0nodev-em1em0]\x00', 0x841, 0x0, 0x0) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) 22:06:13 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x20001000008912, &(0x7f0000000040)="0af51f023c123f3188a070") ioctl$KDGETMODE(r0, 0x5437, 0x0) 22:06:13 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x8941, &(0x7f00000000c0)="000002") 22:06:13 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000000)) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x7ff, 0x200) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000080)) 22:06:13 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d2, &(0x7f00000000c0)="000002") 22:06:13 executing program 0: openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x1f}, &(0x7f0000000080)=0x8) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000240)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)=0x1, 0x1) 22:06:13 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x20001000008912, &(0x7f0000000040)="0af51f023c123f3188a070") ioctl$KDGETMODE(r0, 0x5437, 0x0) 22:06:16 executing program 2: pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) getgid() r0 = gettid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 22:06:16 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x5450, &(0x7f00000000c0)="000002") 22:06:16 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x20001000008912, &(0x7f0000000040)="0af51f023c123f3188a070") ioctl$KDGETMODE(r0, 0x5437, 0x0) 22:06:16 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000000)={r0, 0x3}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x8000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000001c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000200)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000300)=0xe8) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x2) r4 = getpgrp(0x0) sendmsg$nl_generic(r1, &(0x7f0000002a80)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002a40)={&(0x7f0000000340)={0x26d4, 0x34, 0x211, 0x70bd25, 0x25dfdbfd, {0x4}, [@nested={0x8c, 0x52, [@generic="6b9c36bd965d6fe3757bf25634db", @generic="a59f5d7ed5f6a429f074e570f66693c9afdc9d2b673685d9e1f6cad4893d370967c6fe3d1a89a67f5ea75b6deabfad2e69cd2b5292619236d6a139d43acd737d391b288cf37bc3d97cecea2ebad64eb768a7dd7db1e96c2181aaceb73df65ab3b7cc1bb1c6f87794db75ec5f30b2b762438c390ed87408183ac0"]}, @typed={0xc, 0x4f, @u64=0x2}, @generic="6e22ad1a018fd19d6236d1950f922023daf3c7bf673419728414afb3b79c74c156e79e0810bc9ce11169809bc6a28bb48f88675dfeb8ac1d9fd4e171ad6fe3d14ce30aaaf156c9ee78afdad66a9d0a084e8e5578be", @nested={0x180, 0x5d, [@generic="76375174589b942d6007ea8b22566da6f2e1c54e62cd793edb264deb3465075c7519fb214cd56f20267a12d8a69754b1c5324288bcac8653ee973d17940a72067a5376ad61deadb9e30f55ee34bb7cda3f26de36c6d25b1cfd5587599a14a3b97509b62a174d76974693f7b6a10df26e5966b336ebf640298949dfe81d928e550ba23cad0d7336276c69749f869269dcb2dfe7", @generic="17b34c45b3b546b076f20cc424b4a35769603ce93d2461", @typed={0x4, 0x8}, @typed={0x8, 0x46, @u32=0x3}, @typed={0x14, 0x4d, @ipv6=@dev={0xfe, 0x80, [], 0x22}}, @typed={0x8, 0x64, @uid=r2}, @typed={0x30, 0x25, @binary="beb775e31fa2f768dd1c813caa37da499a71513c18d597c183a481d1ffc819ea7091947bc11b260157"}, @typed={0x8, 0x79, @fd=r0}, @generic="d3cd1ad1bf6c32eb4e9fdf02a25eb3c0d62f3cba1f28d17c44a0044769df3026f952ca07c094d16705bbeea6d445326f92d994", @generic="0f8f950faae592e491f215f4c569ed5bcafe6654ca5c1acab5a61cc7b5b0156df773841fe02c79e517dafc26a983fe4505f111381fcaa63f3c81e4de"]}, @generic="477c86182ce1fff22821918588c9dcb8e73b4b32", @generic="d4f7fe13058e932aab7e00516d2a9cb56f170b404b72c22eb89568b3ba30e7183d2d58ce6c9d61c86baa3cc3492e08a3394080fdd644674258919634c005cba35dbdc380dd81c044610b49e19169abde092c814fa196eb5eef76be5bc838da21e5545e64b6eb519b8ebb7625201ce31f1adead757abb5ad4dfe4f524c54172f74320d847ac82a8f03b5d763b3adcf557c13bd91955f44261056b3364f27bf178a005745e87003c562a17017759e6813d09a2be704ab9267fe75c446c05af0acc326754", @nested={0x1284, 0x43, [@generic="975319c7500895b304cd4520e0feedd8968d8d5893d0bd0b7b98b7bac2e03137165691799a587e3966f87129ea36fc21e20b16409fb8d71980807ec6daa9a599e2bfafcb37289c4f6d7b483d0c565c0f664ac2e24d33acb5e662b44aff45669917792654450c1ab151160e1c212ed00e53bd4691a9e13abf818ba428d7db8ec80374ea081b74955743d22331cea5c609e2673592abd8600856", @typed={0x4, 0x35}, @generic="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", @typed={0x8, 0x36, @uid=r3}, @typed={0x100, 0x2d, @binary="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"}, @generic="707a0d652f77c785ba74c081407bd69021a0ecd065b872b6a1a7e1c4088227058e4ad7060dce7b2c4611f4f4a8963fc5a30152e1c9024d2ee822dd76438f33bda7339c79c08299e7587e56a046324e6263cd515264a29dafa87ddd0fd28b83edaf25c18b8a37188ec6292197efcd68b421a0e3743c138d7a0fea5da52ce4b6c821f7138748bba158688c3c5bf39532196d8b5ae86ed614693f98004328c46732248e06a5191f989ec6fbb59db49251bdf0fd690d95a38f3e090afc7c281bd72c34d8a9d4fb04b5b8843aaad8ae408dcbdffd8d0d0662cd9a1675"]}, @nested={0x102c, 0x7a, [@generic, @typed={0x8, 0x77, @pid=r4}, @generic="2a0130e816e6207b02617e10f2741967e9aa0e4b9cd3de23", @typed={0x8, 0x6f, @u32=0x101}, @generic="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", @generic]}, @nested={0xcc, 0x72, [@generic="424b5aab12a872948750b555d81b90550b68607cde7807cbaaf0ba99b89ce3dbac34e91c65283b14cbe7abc016bb47bae87fa9f0896aa535ebb8668e1520ba5b821088ff25ada164f3f5cd4ac91318974c97b677fb955e7768f8dc03c1b0f5db45e35c8943035d145749529ac9b1beda3ad445332effeb5eb7416b83c8eb1e9751071f0ddeb7f7512f029b59c795b72c66a3b31e58f15eea4442bedb71ac55a7c9e3dae8794152402cf05034a11fa54434c0d7f6d7096926527b5f36fb0c30b75d6fd40d0829"]}]}, 0x26d4}, 0x1, 0x0, 0x0, 0x20040040}, 0x4000001) fcntl$setsig(r0, 0xa, 0x5) 22:06:16 executing program 4: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) 22:06:16 executing program 5: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mq_open(&(0x7f0000000040)='/-+GPL-vboxnet0nodev-em1em0]\x00', 0x841, 0x0, 0x0) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) 22:06:16 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448cb, &(0x7f00000000c0)="000002") 22:06:16 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000000)={r0, 0x6}) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xfffffffffffffff8, 0x509200) ioctl$VIDIOC_SUBDEV_S_EDID(r1, 0xc0285629, &(0x7f00000000c0)={0x0, 0x800, 0x400, [], &(0x7f0000000080)=0x2}) 22:06:16 executing program 2: pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) getgid() r0 = gettid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(0x0, 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 22:06:16 executing program 1: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x6) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x20001000008912, &(0x7f0000000040)="0af51f023c123f3188a070") ioctl$KDGETMODE(0xffffffffffffffff, 0x5437, 0x0) [ 301.122985] ================================================================== [ 301.130760] BUG: KASAN: use-after-free in task_is_descendant.part.0+0x6a1/0x6f0 [ 301.138215] Read of size 8 at addr ffff88805885a620 by task syz-executor2/9598 [ 301.145572] [ 301.147209] CPU: 1 PID: 9598 Comm: syz-executor2 Not tainted 4.20.0+ #5 [ 301.153960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.163316] Call Trace: [ 301.165914] dump_stack+0x1db/0x2d0 22:06:16 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000240)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000040)=0x20, 0x4) 22:06:16 executing program 1: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x6) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x20001000008912, &(0x7f0000000040)="0af51f023c123f3188a070") ioctl$KDGETMODE(0xffffffffffffffff, 0x5437, 0x0) [ 301.169554] ? dump_stack_print_info.cold+0x20/0x20 [ 301.174582] ? check_preemption_disabled+0x48/0x290 [ 301.179610] ? task_is_descendant.part.0+0x6a1/0x6f0 [ 301.184729] print_address_description.cold+0x7c/0x20d [ 301.190028] ? task_is_descendant.part.0+0x6a1/0x6f0 [ 301.195138] ? task_is_descendant.part.0+0x6a1/0x6f0 [ 301.200253] kasan_report.cold+0x1b/0x40 [ 301.204377] ? task_is_descendant.part.0+0x6a1/0x6f0 [ 301.209494] __asan_report_load8_noabort+0x14/0x20 [ 301.209516] task_is_descendant.part.0+0x6a1/0x6f0 [ 301.209535] ? yama_relation_cleanup+0x500/0x500 [ 301.209550] ? kasan_check_read+0x11/0x20 [ 301.228271] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 301.233560] ? rcu_softirq_qs+0x20/0x20 [ 301.237549] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 301.243106] yama_ptrace_access_check+0x40d/0x10e8 [ 301.248295] ? task_is_descendant.part.0+0x6f0/0x6f0 [ 301.253413] ? cap_ptrace_access_check+0x2c5/0x6b0 [ 301.258354] ? cap_ptrace_traceme+0x6a0/0x6a0 [ 301.262864] ? lock_downgrade+0x910/0x910 [ 301.267024] ? kasan_check_read+0x11/0x20 [ 301.271184] ? rcu_read_unlock_special+0x380/0x380 [ 301.276128] security_ptrace_access_check+0x71/0xb0 [ 301.281158] __ptrace_may_access+0x555/0x930 [ 301.285581] ? ptrace_setsiginfo+0x1a0/0x1a0 [ 301.289998] ? rcu_read_unlock_special+0x380/0x380 [ 301.294944] ptrace_attach+0x200/0x660 [ 301.298842] __x64_sys_ptrace+0x25c/0x2c0 [ 301.303007] do_syscall_64+0x1a3/0x800 [ 301.306916] ? syscall_return_slowpath+0x5f0/0x5f0 [ 301.311855] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 301.316883] ? __switch_to_asm+0x34/0x70 22:06:16 executing program 1: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x6) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x20001000008912, &(0x7f0000000040)="0af51f023c123f3188a070") ioctl$KDGETMODE(0xffffffffffffffff, 0x5437, 0x0) 22:06:16 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000240)) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@md5={0x1, "ed817ce8cb2cba1bcfa239639bb95f97"}, 0x11, 0x3) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100), 0x4) [ 301.320958] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 301.325812] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.331007] RIP: 0033:0x457ec9 [ 301.334211] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 301.353112] RSP: 002b:00007fc626740c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000065 [ 301.353127] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 0000000000457ec9 [ 301.353136] RDX: 0000000000000000 RSI: 000000000000009f RDI: 0000000000000010 [ 301.353144] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 301.353153] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc6267416d4 [ 301.353163] R13: 00000000004c472d R14: 00000000004d7a50 R15: 00000000ffffffff [ 301.353184] [ 301.353191] Allocated by task 8374: [ 301.353210] save_stack+0x45/0xd0 [ 301.368175] kasan_kmalloc+0xcf/0xe0 [ 301.368188] kasan_slab_alloc+0xf/0x20 [ 301.368200] kmem_cache_alloc_node+0x144/0x710 [ 301.368280] copy_process+0x40bc/0x8730 22:06:16 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x20001000008912, &(0x7f0000000040)="0af51f023c123f3188a070") ioctl$KDGETMODE(r0, 0x5437, 0x0) 22:06:16 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xba, 0x2) setsockopt$inet_int(r1, 0x0, 0x17, &(0x7f0000000040)=0x5, 0x4) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x5, 0x80) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000240)) [ 301.422114] _do_fork+0x1a9/0x1170 [ 301.425664] __x64_sys_clone+0xbf/0x150 [ 301.429648] do_syscall_64+0x1a3/0x800 [ 301.433548] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.438731] [ 301.440368] Freed by task 9599: [ 301.443655] save_stack+0x45/0xd0 [ 301.447115] __kasan_slab_free+0x102/0x150 [ 301.451357] kasan_slab_free+0xe/0x10 [ 301.455167] kmem_cache_free+0x86/0x260 [ 301.459146] free_task+0x170/0x1f0 [ 301.462689] __put_task_struct+0x2e0/0x630 [ 301.466945] delayed_put_task_struct+0x2fd/0x4d0 [ 301.471707] rcu_process_callbacks+0xc4a/0x1680 [ 301.476395] __do_softirq+0x30b/0xb11 [ 301.480195] [ 301.480207] The buggy address belongs to the object at ffff88805885a140 [ 301.480207] which belongs to the cache task_struct(49:syz2) of size 6080 [ 301.480219] The buggy address is located 1248 bytes inside of [ 301.480219] 6080-byte region [ffff88805885a140, ffff88805885b900) [ 301.480224] The buggy address belongs to the page: [ 301.480243] page:ffffea0001621680 count:1 mapcount:0 mapping:ffff88808fd710c0 index:0x0 compound_mapcount: 0 [ 301.480259] flags: 0x1fffc0000010200(slab|head) [ 301.480279] raw: 01fffc0000010200 ffffea0001621388 ffffea0001621708 ffff88808fd710c0 [ 301.495436] raw: 0000000000000000 ffff88805885a140 0000000100000001 ffff888058ce8ec0 [ 301.495442] page dumped because: kasan: bad access detected [ 301.495448] page->mem_cgroup:ffff888058ce8ec0 [ 301.495452] [ 301.495457] Memory state around the buggy address: [ 301.495469] ffff88805885a500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 301.495480] ffff88805885a580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 301.495490] >ffff88805885a600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 301.495496] ^ [ 301.495513] ffff88805885a680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 301.495528] ffff88805885a700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 301.600710] ================================================================== [ 301.608077] Disabling lock debugging due to kernel taint [ 301.621408] Kernel panic - not syncing: panic_on_warn set ... [ 301.627312] CPU: 1 PID: 9598 Comm: syz-executor2 Tainted: G B 4.20.0+ #5 [ 301.635451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.642542] kobject: 'loop2' (0000000037526ead): kobject_uevent_env [ 301.644802] Call Trace: [ 301.653787] dump_stack+0x1db/0x2d0 [ 301.657421] ? dump_stack_print_info.cold+0x20/0x20 [ 301.657639] kobject: 'loop2' (0000000037526ead): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 301.662445] panic+0x2cb/0x589 [ 301.662460] ? add_taint.cold+0x16/0x16 [ 301.662473] ? retint_kernel+0x2d/0x2d [ 301.662491] ? trace_hardirqs_on+0xb4/0x310 [ 301.687253] ? task_is_descendant.part.0+0x6a1/0x6f0 [ 301.692367] end_report+0x47/0x4f [ 301.695822] ? task_is_descendant.part.0+0x6a1/0x6f0 [ 301.700934] kasan_report.cold+0xe/0x40 [ 301.704917] ? task_is_descendant.part.0+0x6a1/0x6f0 [ 301.710026] __asan_report_load8_noabort+0x14/0x20 [ 301.714957] task_is_descendant.part.0+0x6a1/0x6f0 [ 301.719523] kobject: 'loop3' (00000000181f7129): kobject_uevent_env [ 301.719893] ? yama_relation_cleanup+0x500/0x500 [ 301.719907] ? kasan_check_read+0x11/0x20 [ 301.719923] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 301.719937] ? rcu_softirq_qs+0x20/0x20 [ 301.729834] kobject: 'loop3' (00000000181f7129): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 301.731169] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 301.731187] yama_ptrace_access_check+0x40d/0x10e8 [ 301.731203] ? task_is_descendant.part.0+0x6f0/0x6f0 [ 301.731220] ? cap_ptrace_access_check+0x2c5/0x6b0 22:06:17 executing program 4: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) [ 301.774495] ? cap_ptrace_traceme+0x6a0/0x6a0 [ 301.779005] ? lock_downgrade+0x910/0x910 [ 301.783174] ? kasan_check_read+0x11/0x20 [ 301.787328] ? rcu_read_unlock_special+0x380/0x380 [ 301.792272] security_ptrace_access_check+0x71/0xb0 [ 301.797330] __ptrace_may_access+0x555/0x930 [ 301.801763] ? ptrace_setsiginfo+0x1a0/0x1a0 [ 301.806176] ? rcu_read_unlock_special+0x380/0x380 [ 301.811113] ptrace_attach+0x200/0x660 [ 301.815005] __x64_sys_ptrace+0x25c/0x2c0 [ 301.817488] kobject: 'loop4' (00000000c706c504): kobject_uevent_env 22:06:17 executing program 5: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mq_open(&(0x7f0000000040)='/-+GPL-vboxnet0nodev-em1em0]\x00', 0x841, 0x0, 0x0) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) 22:06:17 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x20001000008912, &(0x7f0000000040)="0af51f023c123f3188a070") ioctl$KDGETMODE(r0, 0x5437, 0x0) 22:06:17 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000000)={r0}) 22:06:17 executing program 2: pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) getgid() r0 = gettid() clone(0x4007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2\xaaP[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdh\xc5\xbd\f\x9d\xce\tby(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f\x00\x00\x00', 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', &(0x7f0000000380), &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 22:06:17 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x89a1, &(0x7f00000000c0)="000002") [ 301.819159] do_syscall_64+0x1a3/0x800 [ 301.819179] ? syscall_return_slowpath+0x5f0/0x5f0 [ 301.828949] kobject: 'loop4' (00000000c706c504): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 301.829452] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 301.848805] ? __switch_to_asm+0x34/0x70 [ 301.852877] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 301.857729] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.862935] RIP: 0033:0x457ec9 [ 301.866130] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 301.885033] RSP: 002b:00007fc626740c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000065 [ 301.892755] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 0000000000457ec9 [ 301.900025] RDX: 0000000000000000 RSI: 000000000000009f RDI: 0000000000000010 [ 301.903206] kobject: 'loop5' (0000000044edbd72): kobject_uevent_env [ 301.907293] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 301.907301] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc6267416d4 [ 301.907309] R13: 00000000004c472d R14: 00000000004d7a50 R15: 00000000ffffffff [ 301.914666] Kernel Offset: disabled [ 301.940024] Rebooting in 86400 seconds..