Warning: Permanently added '10.128.0.88' (ECDSA) to the list of known hosts. 2020/04/01 04:25:34 fuzzer started 2020/04/01 04:25:36 dialing manager at 10.128.0.26:35359 2020/04/01 04:25:36 syscalls: 2996 2020/04/01 04:25:36 code coverage: enabled 2020/04/01 04:25:36 comparison tracing: enabled 2020/04/01 04:25:36 extra coverage: enabled 2020/04/01 04:25:36 setuid sandbox: enabled 2020/04/01 04:25:36 namespace sandbox: enabled 2020/04/01 04:25:36 Android sandbox: /sys/fs/selinux/policy does not exist 2020/04/01 04:25:36 fault injection: enabled 2020/04/01 04:25:36 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/04/01 04:25:36 net packet injection: enabled 2020/04/01 04:25:36 net device setup: enabled 2020/04/01 04:25:36 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/04/01 04:25:36 devlink PCI setup: PCI device 0000:00:10.0 is not available 04:27:48 executing program 0: 04:27:49 executing program 1: syzkaller login: [ 233.814500][ T9475] IPVS: ftp: loaded support on port[0] = 21 [ 233.979946][ T9475] chnl_net:caif_netlink_parms(): no params data found [ 234.074874][ T9478] IPVS: ftp: loaded support on port[0] = 21 [ 234.103509][ T9475] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.112134][ T9475] bridge0: port 1(bridge_slave_0) entered disabled state 04:27:49 executing program 2: [ 234.121074][ T9475] device bridge_slave_0 entered promiscuous mode [ 234.133621][ T9475] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.141048][ T9475] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.150887][ T9475] device bridge_slave_1 entered promiscuous mode [ 234.246867][ T9475] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 234.280053][ T9475] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 234.317948][ T9483] IPVS: ftp: loaded support on port[0] = 21 [ 234.345481][ T9475] team0: Port device team_slave_0 added [ 234.382313][ T9475] team0: Port device team_slave_1 added [ 234.442573][ T9475] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 234.460383][ T9475] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 04:27:49 executing program 3: [ 234.487459][ T9475] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 234.505060][ T9478] chnl_net:caif_netlink_parms(): no params data found [ 234.521251][ T9475] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 234.540356][ T9475] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 234.567275][ T9475] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 234.723952][ T9475] device hsr_slave_0 entered promiscuous mode 04:27:49 executing program 4: [ 234.799922][ T9475] device hsr_slave_1 entered promiscuous mode 04:27:50 executing program 5: [ 235.015618][ T9487] IPVS: ftp: loaded support on port[0] = 21 [ 235.071626][ T9478] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.078732][ T9478] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.091666][ T9478] device bridge_slave_0 entered promiscuous mode [ 235.104225][ T9483] chnl_net:caif_netlink_parms(): no params data found [ 235.119486][ T9478] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.129494][ T9478] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.137558][ T9478] device bridge_slave_1 entered promiscuous mode [ 235.162103][ T9492] IPVS: ftp: loaded support on port[0] = 21 [ 235.266621][ T9478] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 235.278895][ T9478] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 235.335243][ T9478] team0: Port device team_slave_0 added [ 235.344086][ T9478] team0: Port device team_slave_1 added [ 235.348363][ T9495] IPVS: ftp: loaded support on port[0] = 21 [ 235.363991][ T9483] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.371324][ T9483] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.379112][ T9483] device bridge_slave_0 entered promiscuous mode [ 235.413013][ T9478] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 235.420207][ T9478] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 235.446428][ T9478] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 235.461307][ T9478] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 235.468263][ T9478] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 235.494792][ T9478] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 235.506605][ T9483] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.514287][ T9483] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.522268][ T9483] device bridge_slave_1 entered promiscuous mode [ 235.555932][ T9483] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 235.577669][ T9483] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 235.683456][ T9478] device hsr_slave_0 entered promiscuous mode [ 235.729840][ T9478] device hsr_slave_1 entered promiscuous mode [ 235.801039][ T9478] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 235.808961][ T9478] Cannot create hsr debugfs directory [ 235.817208][ T9483] team0: Port device team_slave_0 added [ 235.823372][ T9475] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 235.884621][ T9475] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 235.971613][ T9483] team0: Port device team_slave_1 added [ 235.982636][ T9475] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 236.102502][ T9475] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 236.172344][ T9487] chnl_net:caif_netlink_parms(): no params data found [ 236.194145][ T9483] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 236.201433][ T9483] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 236.227532][ T9483] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 236.254382][ T9483] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 236.261639][ T9483] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 236.287984][ T9483] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 236.329141][ T9492] chnl_net:caif_netlink_parms(): no params data found [ 236.441525][ T9483] device hsr_slave_0 entered promiscuous mode [ 236.482952][ T9483] device hsr_slave_1 entered promiscuous mode [ 236.529469][ T9483] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 236.537040][ T9483] Cannot create hsr debugfs directory [ 236.702467][ T9495] chnl_net:caif_netlink_parms(): no params data found [ 236.717045][ T9487] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.725767][ T9487] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.734531][ T9487] device bridge_slave_0 entered promiscuous mode [ 236.772414][ T9487] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.779855][ T9487] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.787560][ T9487] device bridge_slave_1 entered promiscuous mode [ 236.804830][ T9492] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.812193][ T9492] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.820489][ T9492] device bridge_slave_0 entered promiscuous mode [ 236.864170][ T9478] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 236.944836][ T9478] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 237.001865][ T9492] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.009115][ T9492] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.019081][ T9492] device bridge_slave_1 entered promiscuous mode [ 237.028545][ T9487] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 237.053139][ T9478] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 237.123806][ T9487] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 237.147296][ T9478] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 237.218241][ T9492] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 237.246543][ T9492] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 237.276695][ T9495] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.284061][ T9495] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.294079][ T9495] device bridge_slave_0 entered promiscuous mode [ 237.305777][ T9495] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.313146][ T9495] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.326855][ T9495] device bridge_slave_1 entered promiscuous mode [ 237.342395][ T9487] team0: Port device team_slave_0 added [ 237.358818][ T9492] team0: Port device team_slave_0 added [ 237.367865][ T9492] team0: Port device team_slave_1 added [ 237.383677][ T9487] team0: Port device team_slave_1 added [ 237.415712][ T9487] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 237.422831][ T9487] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 237.449206][ T9487] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 237.494729][ T9487] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 237.503431][ T9487] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 237.530172][ T9487] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 237.543173][ T9495] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 237.555956][ T9495] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 237.583452][ T9492] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 237.591015][ T9492] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 237.617917][ T9492] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 237.629027][ T9483] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 237.671625][ T9483] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 237.718141][ T9483] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 237.792625][ T9483] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 237.867803][ T9475] 8021q: adding VLAN 0 to HW filter on device bond0 [ 237.875464][ T9492] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 237.882942][ T9492] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 237.909020][ T9492] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 237.991609][ T9487] device hsr_slave_0 entered promiscuous mode [ 238.029890][ T9487] device hsr_slave_1 entered promiscuous mode [ 238.079662][ T9487] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 238.087351][ T9487] Cannot create hsr debugfs directory [ 238.102211][ T9495] team0: Port device team_slave_0 added [ 238.131891][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 238.141142][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 238.165167][ T9495] team0: Port device team_slave_1 added [ 238.180971][ T9475] 8021q: adding VLAN 0 to HW filter on device team0 [ 238.233880][ T9492] device hsr_slave_0 entered promiscuous mode [ 238.279748][ T9492] device hsr_slave_1 entered promiscuous mode [ 238.339576][ T9492] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 238.347193][ T9492] Cannot create hsr debugfs directory [ 238.381654][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 238.391508][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.400529][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.407749][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.416746][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 238.428560][ T9495] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 238.435582][ T9495] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 238.465104][ T9495] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 238.508766][ T9495] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 238.516427][ T9495] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 238.543533][ T9495] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 238.563952][ T3988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 238.575424][ T3988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 238.583950][ T3988] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.591083][ T3988] bridge0: port 2(bridge_slave_1) entered forwarding state [ 238.691614][ T9495] device hsr_slave_0 entered promiscuous mode [ 238.750374][ T9495] device hsr_slave_1 entered promiscuous mode [ 238.779477][ T9495] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 238.787073][ T9495] Cannot create hsr debugfs directory [ 238.815582][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 238.836245][ T9478] 8021q: adding VLAN 0 to HW filter on device bond0 [ 238.857819][ T3988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 238.899210][ T3990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 238.908219][ T3990] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 238.924600][ T9478] 8021q: adding VLAN 0 to HW filter on device team0 [ 238.961281][ T3988] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 238.969230][ T3988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 238.978185][ T3988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 239.015109][ T9487] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 239.069453][ T3990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 239.078030][ T3990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 239.087416][ T3990] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.094536][ T3990] bridge0: port 1(bridge_slave_0) entered forwarding state [ 239.104100][ T3990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 239.112847][ T3990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 239.121432][ T3990] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.128461][ T3990] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.136138][ T3990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 239.145266][ T3990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 239.154204][ T3990] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 239.180161][ T9483] 8021q: adding VLAN 0 to HW filter on device bond0 [ 239.186989][ T9487] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 239.256712][ T9487] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 239.332438][ T3988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 239.340848][ T3988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 239.349179][ T3988] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 239.376603][ T9487] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 239.442534][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 239.452046][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 239.461416][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 239.472608][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 239.481951][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 239.505850][ T9475] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 239.523968][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 239.531938][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 239.540848][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 239.549150][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 239.557559][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 239.615310][ T9478] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 239.627362][ T9478] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 239.635946][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 239.644545][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 239.652493][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 239.660848][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 239.674417][ T9483] 8021q: adding VLAN 0 to HW filter on device team0 [ 239.705575][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 239.715786][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 239.744243][ T9492] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 239.791842][ T9492] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 239.846290][ T9492] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 239.911291][ T9492] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 239.966258][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 239.975917][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 239.985113][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.992211][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.004190][ T9475] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 240.044750][ T9478] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 240.055715][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 240.063931][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 240.072086][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 240.099644][ T9495] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 240.172568][ T9495] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 240.239725][ T3990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 240.248517][ T3990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.257824][ T3990] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.264934][ T3990] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.273477][ T3990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 240.299940][ T9495] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 240.331880][ T9495] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 240.389601][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 240.398393][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 240.409985][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 240.418328][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 240.427570][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 240.468220][ T3988] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 240.476136][ T3988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 240.485191][ T3988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 240.494366][ T3988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 240.503402][ T3988] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 240.532224][ T9478] device veth0_vlan entered promiscuous mode [ 240.543656][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 240.555225][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 240.563619][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 240.572109][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 240.581403][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 240.589834][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 240.608064][ T9475] device veth0_vlan entered promiscuous mode [ 240.632453][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 240.641132][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 240.653289][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 240.663298][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 240.676630][ T9478] device veth1_vlan entered promiscuous mode [ 240.697794][ T9483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 240.717236][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 240.730164][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 240.738091][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 240.749254][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 240.776995][ T9475] device veth1_vlan entered promiscuous mode [ 240.798235][ T9487] 8021q: adding VLAN 0 to HW filter on device bond0 [ 240.808093][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 240.816853][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 240.825775][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 240.837877][ T9478] device veth0_macvtap entered promiscuous mode [ 240.877918][ T9478] device veth1_macvtap entered promiscuous mode [ 240.925948][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 240.935659][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 240.944388][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 240.952570][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 240.960732][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 240.968139][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.976286][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.987660][ T9483] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 240.999105][ T9478] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 241.013927][ T9478] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 241.028792][ T9492] 8021q: adding VLAN 0 to HW filter on device bond0 [ 241.046049][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 241.054725][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 241.063868][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 241.075689][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 241.088876][ T9487] 8021q: adding VLAN 0 to HW filter on device team0 [ 241.116571][ T9475] device veth0_macvtap entered promiscuous mode [ 241.148918][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 241.159081][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 241.167786][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 241.176541][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 241.185185][ T2858] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.192314][ T2858] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.200676][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 241.208806][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 241.295142][ T9475] device veth1_macvtap entered promiscuous mode [ 241.303804][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 241.313133][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 241.322564][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 241.331984][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 241.341305][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 241.351002][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.358072][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.366071][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 241.376581][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 241.384562][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 241.447256][ T9492] 8021q: adding VLAN 0 to HW filter on device team0 [ 241.468419][ T3988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 241.589847][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 241.602717][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 241.611463][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 241.621526][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 241.630854][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 241.642183][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 241.650629][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.657657][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.665382][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 241.674241][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 241.683440][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.690586][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.704225][ T9483] device veth0_vlan entered promiscuous mode [ 241.716325][ T9495] 8021q: adding VLAN 0 to HW filter on device bond0 [ 241.735560][ T9475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 241.747134][ T9475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 241.781766][ T9475] batman_adv: batadv0: Interface activated: batadv_slave_0 04:27:57 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, &(0x7f0000000280)="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"}) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) [ 241.789148][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 241.804571][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 241.823288][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready 04:27:57 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, &(0x7f0000000280)="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"}) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) [ 241.851441][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 241.862906][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 241.881420][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 241.890737][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 04:27:57 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, &(0x7f0000000280)="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"}) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) [ 241.906905][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 241.929666][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 241.945622][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 04:27:57 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f00000000c0)={0x0, 0x0, 0xa, 0x0, 0x0, &(0x7f0000000280)="36e9ffab312178a56840c1a0d1b2e2cac48c79e1c2420a93f67fecc715a54abc3ed9193805006fff52c4c812df0d1232673feb64458db799478711aad6121e8924cd215cfbffd840e346e517409ae96ab6ff01673a5207ceb2a746c94e90a7401336239c7277db1896243abf8a9c9a6fd696190fbe106b8cb85bb01ead79e201c0bfc78a9377bf3d5012aa5e4914bf2ef3967169aea60982bf20826757758bfd487e8e43dfec750c3568e8b57f0db09b598741bf39f1cb91aa39f74a01021d8ed3e560d9a8fe221b1764b07c043537b21cd3b429ab8974d0d612505e598a7b84ff8d26f91b0cf57e3797ef60823621b8f8573f9663a6eecadbbfdda8a3a455a8075098040e406eb40e7bfd4622cb8f4d0d2ab36cc0875fbdc0575e841527de76971bcb8de1a9201acfa6f89f80957fe85e22a4d3997188757685a173c4fbbb44ba9efde864b08ebb12f26e499969395c7c9b5912db9ade13271cba4076f8be703f81b60e8594a4993ffb99db243ff11ab29e9e16ef814202d0446a78393481e0ddcf6cab37405bf915fb6407316e9e792e02a98acdd25124ab6d40d0ec2d9322207d0b81acc1badfc732e6167c744fab074371daf3d99473ec1a0e51971b426c8556d54893c210e137ae4802a29fa8e9599c9f9c80a9ef906d87462e455f5927512df1ae967bd8bc6639eb80ac62de92740d734e8a4998955be2b4912a98d39f9fbc97a65863de711add8c792880b140e564fd0db66e1324cdd8d31939212f526fa87c31778e42f08a1a9a718243e654b1c8ce438f033b8d5b221ea466547e3c8ea8a62ab2d0d3523ac4c6a9ec33eecf5fceb6261062ebd99b14eea5f0a4626f457b468a33543f4654e9bd8cf259c382fdb96279518f279b182bc3ae816efb2ff4cbd6a4165e8194c7995749864b67e820c933b238efdaa38127a53a1950f7c2474f5ea58aa513346b9184806ad598492122e445d4b38f6d860efb35a624b463e12bdfe452cef12b9826da99ed328a19029e669358fe4ec93de8cdf67c84a069a9202633143fe73fa318e69043058d4cbdc296a0549ffd97dce9a042f5375f26110250523b0055cdfe4497349fdb332d27e07cd09724f589aa12288e7c450f8525453da50bd9892b897e54d74e71d34c2523d228bbec5e1803db79f4fbfdc8e5e1d8c2ea4f848273254a82a1db880c7693cd3f09d0a09baf11186d6a4e41dcf61ff7d2c4667e16fa55985b11707ff27099f8e806129311009eb36ed2b3d1cf5b9ec847442272aaf74110cb434300575a52989e70169fd3f81a680c1c45418f21871db19862c6abec95ef713ea452ac745ea0613a3f68b93a5126d1fb792846d8cad83169d9794dcf6820ea1f74983e67017f42cf6594d1c26f029f13cd6f1368e86f499ed3b4f863c4a1effe641afecf6c52abf406666492ace3e8d2bdd627ae"}) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) [ 241.964322][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 241.980065][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 242.024953][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 242.040569][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 242.064662][ T9475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 04:27:57 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) [ 242.086387][ T9475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 242.099124][ T9475] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 242.115332][ T9483] device veth1_vlan entered promiscuous mode [ 242.126492][ T9487] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 04:27:57 executing program 1: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) [ 242.155405][ T3988] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 242.163745][ T3988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 242.184454][ T3988] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 242.203343][ T3988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 242.220807][ T3988] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 242.240148][ T3988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 242.254202][ T3988] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 242.262735][ T3988] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 242.272047][ T3988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 242.293197][ T3988] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 242.301253][ T3988] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 242.308934][ T3988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 242.317955][ T3988] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 242.339708][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 242.347451][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 242.363352][ T9492] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 242.414941][ T9495] 8021q: adding VLAN 0 to HW filter on device team0 [ 242.556626][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 242.564260][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 242.572206][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 242.581920][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 242.595996][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.603086][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 242.611231][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 242.619991][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 242.628417][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 242.636004][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 242.651428][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 242.659515][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 242.668087][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 242.677180][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.684277][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 242.693508][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 242.711811][ T9492] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 242.721389][ T9487] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 242.730648][ T9483] device veth0_macvtap entered promiscuous mode 04:27:58 executing program 1: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 04:27:58 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000840)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000100300005001000000000000000000000000000000000000780200007802000078020000780200007802000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000e800500100000000000000000000000000000000000000003000636f6e6e6d61726b000000000000000000000000000000000000000000010000000000000000000000000000000048006e666163637400000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000068004354000000000000000000000000000000000000000000000000000000020000000000000000000000007070747000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000280100000000000000000000000000000000000000002800727066696c7465720000000000000000000000000000000000000000000000000000000000002800636f6e6e6c6162656c00000000000000000000000000000000000000000000000000000000006800435400000000000000000000000000000000000000000000000000000001000000000000000000000000736e6d705f747261700000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff"], 0x1) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x10000000008, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r4, 0x0, r3, 0x0, 0x10000000008, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x5, 0x70, 0xdd, 0x2, 0x2, 0x0, 0x0, 0x200, 0x21348, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7f, 0x2, @perf_bp={&(0x7f0000000080)}, 0x3843, 0x6, 0x3, 0x7, 0x5, 0x4}, r1, 0xa, r3, 0x4) sendto$inet(r0, &(0x7f0000000000)="e2846582e418a9fd5d082003b617626c9c4324b105987da37a2a470725a2ae29bbe12f695decaf9eb8d2660e8c2190092d83e2adf0abb7e56cd98062e76f9eac5e5ebacf378d01f5938b32666724c0952f14f05ad5cab74720a810f3d544778cde3e0faa31e5a3107ae7a8ed599425355deeefd30c", 0x75, 0x40000, 0x0, 0x0) [ 242.766099][ T9483] device veth1_macvtap entered promiscuous mode [ 242.789635][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 242.797798][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 242.866121][ T9539] xt_nfacct: accounting object `syz0' does not exists [ 242.900426][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 242.921964][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 242.966666][ T9483] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 242.980021][ T9483] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 243.000388][ T9483] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 243.016907][ T9483] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 243.029117][ T9483] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 243.054283][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 243.063263][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 243.076606][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 243.085449][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 243.097230][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 243.108116][ T9483] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 243.121835][ T9483] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 243.132150][ T9483] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 243.142898][ T9483] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 243.154266][ T9483] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 243.169023][ T9487] device veth0_vlan entered promiscuous mode [ 243.177165][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 243.187882][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 243.197865][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 243.206341][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 243.214696][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 243.224984][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 243.234085][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 243.241946][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 243.270196][ T9487] device veth1_vlan entered promiscuous mode [ 243.281568][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 243.289961][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 243.298197][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 243.327295][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 243.336962][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 243.345556][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 243.354545][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 243.372616][ T9495] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 243.458573][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 243.468595][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 243.476695][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 243.497555][ T9495] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 243.517309][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 243.526463][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 243.536471][ T9492] device veth0_vlan entered promiscuous mode [ 243.608724][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 243.620174][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 243.627882][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 243.638454][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 243.652737][ T9487] device veth0_macvtap entered promiscuous mode [ 243.738440][ T9492] device veth1_vlan entered promiscuous mode [ 243.761048][ T9487] device veth1_macvtap entered promiscuous mode [ 243.809923][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 243.818004][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 243.833442][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 243.856312][ T9492] device veth0_macvtap entered promiscuous mode [ 243.868596][ T9487] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 243.888363][ T9487] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 243.899072][ T9487] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 04:27:59 executing program 1: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) [ 243.909999][ T9487] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 243.935737][ T9487] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 243.956550][ T9487] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 243.979134][ T9487] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 243.995755][ T9492] device veth1_macvtap entered promiscuous mode [ 244.008671][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 244.019947][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 244.028178][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 244.038210][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 244.047711][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 244.056964][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 244.079004][ T9487] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 244.092399][ T9487] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 244.104724][ T9487] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 244.117595][ T9487] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 244.127854][ T9487] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 244.138732][ T9487] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 244.151518][ T9487] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 244.180188][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 244.188823][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 244.216940][ T9495] device veth0_vlan entered promiscuous mode [ 244.232443][ T9492] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 244.247537][ T9492] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 244.257777][ T9492] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 244.270744][ T9492] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 244.280926][ T9492] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 244.291439][ T9492] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 244.301383][ T9492] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 244.312334][ T9492] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 244.323913][ T9492] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 244.342037][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 244.351446][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 244.359976][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 244.368511][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 244.378348][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 244.386799][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 244.398220][ T9492] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 244.409291][ T9492] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 244.419215][ T9492] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 244.431344][ T9492] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 244.442782][ T9492] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 244.453275][ T9492] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 244.463125][ T9492] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 244.473951][ T9492] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 244.485266][ T9492] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 244.510711][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 244.519548][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 244.601940][ T9495] device veth1_vlan entered promiscuous mode [ 244.670728][ T0] NOHZ: local_softirq_pending 08 [ 244.686357][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 244.895544][ T9495] device veth0_macvtap entered promiscuous mode [ 244.905836][ T2764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 244.916239][ T2764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 244.937021][ T9495] device veth1_macvtap entered promiscuous mode 04:28:00 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x400004e21, 0x0, @loopback}, 0x1c) r2 = socket(0x10, 0x2, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") setsockopt$inet6_int(r1, 0x29, 0x43, &(0x7f0000000080)=0xf5, 0x4) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={0x0, 0x0, 0x20}, 0xc) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="18c49d3f"], 0x10098) [ 244.973500][ T2764] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 244.988609][ T2764] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 245.074962][ T9495] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 245.094183][ T9495] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 245.112107][ T9495] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 04:28:00 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) [ 245.122995][ T9495] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 245.169497][ T9495] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 245.189137][ T9495] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 245.210580][ T9495] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 245.234713][ T9495] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 245.254833][ T9495] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 245.282415][ T9495] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 245.305486][ T9495] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 245.337208][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 245.346308][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 245.366823][ T9495] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 245.387868][ T9495] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 245.419285][ T9495] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 245.446966][ T9495] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 245.464386][ T9495] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 245.476642][ T9495] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 245.487362][ T9495] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 245.499996][ T9495] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 245.510270][ T9495] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 245.521390][ T9495] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 245.533795][ T9495] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 245.544606][ T2764] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 245.554722][ T2764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 04:28:01 executing program 3: clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x97) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @rand_addr="100e0e188dec22c679daac3b6f3d26b3"}]}, &(0x7f0000000180)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x7c, &(0x7f0000000480)={r4}, 0x14) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @rand_addr="100e0e188dec22c679daac3b6f3d26b3"}]}, &(0x7f0000000180)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x7c, &(0x7f0000000480)={r7}, 0x14) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000080)={r7, 0x81, 0x1}, 0x8) splice(r1, 0x0, r0, 0x0, 0x10000000008, 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000000)) 04:28:01 executing program 2: getpid() r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000000008, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x10000000008, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r3, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r4}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, r1, 0x0, 0x10, &(0x7f0000000100)='vmnet0*bdevGPL$\x00', r4}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f00000000c0)=',vboxnet0em0vboxnet0\x00', r5}, 0x30) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffc1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = inotify_init() r8 = open(&(0x7f00000005c0)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r7, &(0x7f0000000000)='./file0\x00', 0x4000082) r9 = socket$nl_route(0x10, 0x3, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r6, &(0x7f0000000240)={0xffffffffffffffff, r9}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_BIND(r8, &(0x7f0000000640)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e24, @broadcast}}}, 0x90) sendfile(r8, r8, &(0x7f0000000080), 0xa198) 04:28:01 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 04:28:01 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x400004e21, 0x0, @loopback}, 0x1c) r2 = socket(0x10, 0x2, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") setsockopt$inet6_int(r1, 0x29, 0x43, &(0x7f0000000080)=0xf5, 0x4) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={0x0, 0x0, 0x20}, 0xc) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="18c49d3f"], 0x10098) 04:28:01 executing program 4: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPAN_DISPLAY(r0, 0x4606, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, {0x0, 0x0, 0x40}, {}, {}, {}, 0x0, 0x151}) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, &(0x7f0000000100)={0x3, 0x282b, [0x200, 0x80, 0x40, 0x1ff, 0x3], 0x5}) r1 = socket$inet(0x2, 0x80001, 0x84) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000200)='fou\x00') sendmsg$FOU_CMD_GET(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14, r3, 0x389}, 0x14}}, 0x0) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r4, 0xdb9ab1f910d721e0, 0x70bd2c, 0x0, {}, [@NLBL_CALIPSO_A_DOI={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4010}, 0x40) sendmsg$NLBL_CALIPSO_C_LIST(r2, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)={0x44, r4, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x20008001}, 0x4) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) r5 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r5, 0x0, 0xffffffffffffffff, 0x0, 0x10000000008, 0x0) r6 = open(&(0x7f00000001c0)='./file0\x00', 0x200, 0x84) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r6, 0xc018620c, &(0x7f0000000240)) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000180)={0x3, 0xc1, 0x4}) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r8, 0x0, r7, 0x0, 0x10000000008, 0x0) 04:28:01 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 04:28:01 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB="020a000007000000b6f1ffff0000854105001a000000000000d74619edc70000000000000000000000000000000000000000000702000227dfbf2408204afc934b03a90b1fe68c604cff15fcffffffffffffff000100cb4058306fcd8fa2b5d01f982050c552382c80195913711e5b8b41a5ab706883a8f411989e33c2b736120f39cd98a7b001e768817d1e3f52052ff51609ce969b2438721f48424587011bcdb2b98cf99f16ec1c928ce499052e26706f6b60a69b04fc6a88978ba83e2f501fa0103597b382967eea1327f332c0d9d9df0acbfae0cbddcdcc9563393b6aa146e0002f4f2a7259f2b314cbf135325debeed9d9d1a43246ef06dcf1cf07b6e866a1901805ff355970659278149c21841c76b3e5db91f5eb05019caaebb71b38568710427680cbd702a6b47be9cb6c234406d940b161211f6a5d5d508de325078cbb70b957348a02d525d9ffcbce411ec954e3ae39835fb7de9c3d27980a71e3354e5dc66eba011f4fe6f8fc93784d00"/381], 0x38}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x2, 0x17, 0x8, 0x0, 0x1d, 0x0, 0x70bd2a, 0x25dfdbff, [@sadb_x_sec_ctx={0x1b, 0x18, 0x6, 0x81, 0xcb, "c01cfdd571bc921b734b25bc85d3d2c29f6708856824104d5aef4b60b58971059c0c476a2fa0e49ed94210e87d56085d8234e863a258b06666dd4eb3aecb7b2585df944341d546d2cf1c844a75a79ab46478524f2eddf414aa27a19f0e960c907ebf1f73200d66cb9b37996f5d049877ee2741f890cb19f70ba56a03cfa1df4055a71db908e253fbd908bb8e69c88c301f25e90892fb090b1402691d07643797c766e75796602b30d12d471cbe3e321c5b45f93acd34d91a5f2d6fac87628611ea30468dcae9c478e66902"}]}, 0xe8}}, 0x8000) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="020100000e000000030000000000000405000600000000000a00fbffffff0504000000000000000000d0000000000000000100000000000002000100010000000000000200fd000005000500000000000a004872bbb689620900b24225c1d4405b92593f771000"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x3ef, 0x0) 04:28:01 executing program 4: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPAN_DISPLAY(r0, 0x4606, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, {0x0, 0x0, 0x40}, {}, {}, {}, 0x0, 0x151}) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, &(0x7f0000000100)={0x3, 0x282b, [0x200, 0x80, 0x40, 0x1ff, 0x3], 0x5}) r1 = socket$inet(0x2, 0x80001, 0x84) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000200)='fou\x00') sendmsg$FOU_CMD_GET(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14, r3, 0x389}, 0x14}}, 0x0) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r4, 0xdb9ab1f910d721e0, 0x70bd2c, 0x0, {}, [@NLBL_CALIPSO_A_DOI={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4010}, 0x40) sendmsg$NLBL_CALIPSO_C_LIST(r2, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)={0x44, r4, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x20008001}, 0x4) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) r5 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r5, 0x0, 0xffffffffffffffff, 0x0, 0x10000000008, 0x0) r6 = open(&(0x7f00000001c0)='./file0\x00', 0x200, 0x84) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r6, 0xc018620c, &(0x7f0000000240)) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000180)={0x3, 0xc1, 0x4}) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r8, 0x0, r7, 0x0, 0x10000000008, 0x0) 04:28:01 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 04:28:01 executing program 3: perf_event_open(&(0x7f000001d000)={0xffffffffffffffff, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='c', 0xfffff, r1) keyctl$update(0x2, 0x0, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x80000, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000000008, 0x0) ioctl$KVM_SET_ONE_REG(r2, 0x4010aeac, &(0x7f00000002c0)={0xfffffffffffffffd, 0x8001}) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r4 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x10000, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x4, @local, 0x3}, {0xa, 0x4e20, 0xb, @local, 0x80000001}, r6, 0x1f806}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getsockopt$X25_QBITINCL(r4, 0x106, 0x1, &(0x7f0000000240), &(0x7f0000000280)=0x4) 04:28:01 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @rand_addr="100e0e188dec22c679daac3b6f3d26b3"}]}, &(0x7f0000000180)=0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000200)='fou\x00') sendmsg$FOU_CMD_GET(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14, r4, 0x389}, 0x14}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2408000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xf6e}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0xa004814) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x7c, &(0x7f0000000480)={r6}, 0x14) setsockopt$sock_int(r2, 0x1, 0x1d, &(0x7f0000000000), 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e20, 0x4, @remote, 0x4}, @in={0x2, 0x4e21, @multicast2}, @in6={0xa, 0x4e20, 0x10, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7c00}, @in6={0xa, 0x4e22, 0x9, @dev={0xfe, 0x80, [], 0x24}, 0xcb}, @in6={0xa, 0x4e24, 0x7fff, @rand_addr="066d717f8a1d823ef200", 0x3}, @in6={0xa, 0x4e23, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x40}, @in6={0xa, 0x4e22, 0x4, @ipv4={[], [], @local}, 0x200000}], 0xc8) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 04:28:01 executing program 2: getpid() r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000000008, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x10000000008, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000a40)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff5070000000000000200000000000c09695000000000000002ba728041598d6fbd30cb599e83d24a3aa81d36bb3019c13bd2321afb56fa54f36fb0b71d0e6adfe226bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc0dc8cedf3ceb9fbfbf9b0a4def23d410f6296b0db6cf529a2255b6b079e38032a8343881dcc7b1b85f453d44aeaccd3641110bec4e90a6341965c39e4b3449abe802f1ab3e89cf6c662ed4048d3b3e22278d00031e5388e85c867ddd58211d6ececb0cd2b6d357b8580218ce74e467725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b24efa000000000000000000e0ff00000000000000000000003e4bcf8500000000000000000000000000b27cf3d1848a54d7132be1ffb0adf9deab29ea3323aa9fdfb52faf649c3bfdbc6ec664b91a6844efdebb7b3de8f6333f6c962b9f292324f41ab11f12fb1e2c494034127de79f40159e800ea2474b542d35a30b23bcee46762c2093bcc9eae5ee3e980026c96f80ee1a744d9a485c5989b8e633e3296e52d3370688c19322b95a2315b395000000000000000000000000020a40f135429e817e01e732000000001420d1a66e9b7ff12c96cf4f5bb64a74fc10070f62b6a5c67a8c59b29adcd9b4c116fbf54d055275eb505c98c8dfa61fa426cc78ca0cce5989dcbb0d156d34e53531251e502cbdf73101881e6222c601918400a6ba4a91f1d31c79eed85de58202d456a9b794c0fe5f167728867f22575e5525985d37c7e99a984ee1775b2370f0858a2adf13098b629db6009dd69916cbb5d407001dd62cadc9e23f46faf1906d6294071b19178dca12e5bd15ad4a4cad7a1f6000ffd6aa20050000000000000000000000000000000000ed042649e9a1aa18d9861a3abb5237f9df40"], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r3, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r4}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, r1, 0x0, 0x10, &(0x7f0000000100)='vmnet0*bdevGPL$\x00', r4}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f00000000c0)=',vboxnet0em0vboxnet0\x00', r5}, 0x30) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffc1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = inotify_init() r8 = open(&(0x7f00000005c0)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r7, &(0x7f0000000000)='./file0\x00', 0x4000082) r9 = socket$nl_route(0x10, 0x3, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r6, &(0x7f0000000240)={0xffffffffffffffff, r9}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_BIND(r8, &(0x7f0000000640)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e24, @broadcast}}}, 0x90) sendfile(r8, r8, &(0x7f0000000080), 0xa198) 04:28:01 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, 0x0) 04:28:01 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7, 0x80) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r2, 0x8983, &(0x7f0000000080)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000800)=@raw={'raw\x00', 0x2, 0x3, 0x348, 0x0, 0x0, 0x0, 0x1f8, 0x1f8, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, 0x0, {[{{@ip={@local, @broadcast, 0x0, 0x0, 'ip6tnl0\x00', 'team_slave_1\x00'}, 0x0, 0x1c8, 0x1f8, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'veth1_to_bond\x00', {0x1, 0x0, 0x41, 0x0, 0x0, 0x5, 0x46}}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x3a8) r4 = socket(0x11, 0x80a, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) bind$vsock_stream(0xffffffffffffffff, &(0x7f00000002c0)={0x28, 0x0, 0x0, @my=0x1}, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bond0\x00'}) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f00000001c0), 0x8) sendmsg$AUDIT_ADD_RULE(r4, &(0x7f0000000600)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000005c0)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x45c}}, 0x4090) r5 = socket$inet(0x2, 0x80001, 0x84) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000180)=0x4) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000200)=@broute={'broute\x00', 0x20, 0x1, 0x17e, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, &(0x7f0000000140), &(0x7f0000000340)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffd, 0x1, [{0x11, 0xc0, 0x9a5a1287616e7acc, 'rose0\x00', 'veth1_to_bond\x00', 'veth0_to_bridge\x00', 'batadv_slave_1\x00', @broadcast, [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], @multicast, [0x0, 0x0, 0xff], 0x6e, 0x9e, 0xee, [], [@common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x100}}}], @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x9, 'syz0\x00', {0x8}}}}}]}]}, 0x1f6) 04:28:01 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @rand_addr="100e0e188dec22c679daac3b6f3d26b3"}]}, &(0x7f0000000180)=0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000200)='fou\x00') sendmsg$FOU_CMD_GET(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14, r4, 0x389}, 0x14}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2408000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xf6e}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0xa004814) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x7c, &(0x7f0000000480)={r6}, 0x14) setsockopt$sock_int(r2, 0x1, 0x1d, &(0x7f0000000000), 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e20, 0x4, @remote, 0x4}, @in={0x2, 0x4e21, @multicast2}, @in6={0xa, 0x4e20, 0x10, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7c00}, @in6={0xa, 0x4e22, 0x9, @dev={0xfe, 0x80, [], 0x24}, 0xcb}, @in6={0xa, 0x4e24, 0x7fff, @rand_addr="066d717f8a1d823ef200", 0x3}, @in6={0xa, 0x4e23, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x40}, @in6={0xa, 0x4e22, 0x4, @ipv4={[], [], @local}, 0x200000}], 0xc8) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 246.695565][ C0] hrtimer: interrupt took 50844 ns 04:28:01 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, 0x0) 04:28:02 executing program 4: prctl$PR_SET_UNALIGN(0x6, 0x2) syz_open_procfs(0x0, &(0x7f0000000000)='timerslack_ns\x00') r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @rand_addr="100e0e188dec22c679daac3b6f3d26b3"}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x7c, &(0x7f0000000480)={r2}, 0x14) writev(r0, &(0x7f0000002680), 0x0) 04:28:02 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, 0x0) 04:28:02 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @rand_addr="100e0e188dec22c679daac3b6f3d26b3"}]}, &(0x7f0000000180)=0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000200)='fou\x00') sendmsg$FOU_CMD_GET(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14, r4, 0x389}, 0x14}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2408000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xf6e}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0xa004814) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x7c, &(0x7f0000000480)={r6}, 0x14) setsockopt$sock_int(r2, 0x1, 0x1d, &(0x7f0000000000), 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e20, 0x4, @remote, 0x4}, @in={0x2, 0x4e21, @multicast2}, @in6={0xa, 0x4e20, 0x10, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7c00}, @in6={0xa, 0x4e22, 0x9, @dev={0xfe, 0x80, [], 0x24}, 0xcb}, @in6={0xa, 0x4e24, 0x7fff, @rand_addr="066d717f8a1d823ef200", 0x3}, @in6={0xa, 0x4e23, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x40}, @in6={0xa, 0x4e22, 0x4, @ipv4={[], [], @local}, 0x200000}], 0xc8) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 04:28:02 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xfffffffffffffe83}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02020609100000000000004c9e0000000200130002000000000000000000004105000600200000000a00000000000000000500e50008070000001f00000000000009200000000000020001000000000000000002000098a805000500000000000a00000000000000ff1700000000ffff00ba90a27854bb86020000ff00000000b3e6e44468a8bb71384a34542c29513db37b0e15712d698c1949695c1420914e00591abf5f03d977b781bae815b53f67378e9b7665c5874388e2c4b5f743ed329627643507a4d6da"], 0x80}}, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000200)=0x1, 0x4) sendmmsg(r0, &(0x7f0000000180), 0x393, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) sendmmsg(r3, &(0x7f0000000180), 0x393, 0x0) 04:28:02 executing program 1 (fault-call:1 fault-nth:0): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) 04:28:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e6b00002c00056bd2e9fcf8c11a057d0439e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r6}) r7 = semget$private(0x0, 0x4, 0x461) semctl$GETNCNT(r7, 0x1, 0xe, &(0x7f0000000340)=""/233) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r6}]}, 0x24}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)=@delqdisc={0xe8, 0x25, 0x4, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, r6, {0x8, 0xffe0}, {0x10, 0xf}, {0x5, 0x1}}, [@TCA_INGRESS_BLOCK={0x8, 0xd, 0x800}, @qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x24, 0x2, [@TCA_HHF_BACKLOG_LIMIT={0x8, 0x1, 0x3c}, @TCA_HHF_NON_HH_WEIGHT={0x8, 0x7, 0x7}, @TCA_HHF_EVICT_TIMEOUT={0x8, 0x6, 0x7}, @TCA_HHF_QUANTUM={0x8, 0x2, 0x7}]}}, @TCA_STAB={0x50, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x5, 0x6, 0x6, 0x0, 0x0, 0x7, 0x9, 0x3}}, {0xa, 0x2, [0x4, 0x6, 0x8861]}}, {{0x1c, 0x1, {0x3, 0x9, 0x40, 0x100, 0x0, 0x7, 0x6, 0x2}}, {0x8, 0x2, [0x0, 0x0]}}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x8}, @qdisc_kind_options=@q_bfifo={{0xa, 0x1, 'bfifo\x00'}, {0x8, 0x2, 0x1}}, @qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x14, 0x2, [@TCA_HHF_EVICT_TIMEOUT={0x8, 0x6, 0x3}, @TCA_HHF_ADMIT_BYTES={0x8, 0x5, 0x80}]}}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x5}]}, 0xe8}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) [ 247.326215][ T9654] FAULT_INJECTION: forcing a failure. [ 247.326215][ T9654] name failslab, interval 1, probability 0, space 0, times 1 [ 247.356655][ T9654] CPU: 0 PID: 9654 Comm: syz-executor.1 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 247.366500][ T9654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.376563][ T9654] Call Trace: [ 247.379957][ T9654] dump_stack+0x188/0x20d [ 247.384342][ T9654] should_fail.cold+0x5/0x14 [ 247.388957][ T9654] ? setup_fault_attr+0x1e0/0x1e0 [ 247.394048][ T9654] ? tcp_ca_find_autoload.isra.0+0x240/0x290 [ 247.400079][ T9654] should_failslab+0x5/0xf [ 247.404527][ T9654] __kmalloc+0x2d9/0x7a0 [ 247.408787][ T9654] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 247.414787][ T9654] ? tomoyo_realpath_from_path+0xc2/0x620 [ 247.420540][ T9654] ? mark_lock+0xbc/0x1220 [ 247.424984][ T9654] ? _kstrtoull+0x13f/0x1f0 [ 247.429491][ T9654] tomoyo_realpath_from_path+0xc2/0x620 [ 247.435052][ T9654] ? tomoyo_path_number_perm+0x17a/0x4d0 [ 247.440696][ T9654] tomoyo_path_number_perm+0x1c2/0x4d0 [ 247.446145][ T9654] ? tomoyo_path_number_perm+0x17a/0x4d0 [ 247.451780][ T9654] ? tomoyo_execute_permission+0x470/0x470 [ 247.457623][ T9654] ? get_pid_task+0x116/0x200 [ 247.462332][ T9654] ? __fget_files+0x307/0x4f0 [ 247.467073][ T9654] ? __fget_files+0x329/0x4f0 [ 247.471756][ T9654] ? do_dup2+0x520/0x520 [ 247.476030][ T9654] ? __sb_end_write+0x101/0x1d0 [ 247.480873][ T9654] ? vfs_write+0x15b/0x5c0 [ 247.485337][ T9654] security_file_ioctl+0x6c/0xb0 [ 247.490296][ T9654] ksys_ioctl+0x50/0x180 [ 247.494538][ T9654] __x64_sys_ioctl+0x6f/0xb0 [ 247.499120][ T9654] ? lockdep_hardirqs_on+0x417/0x5d0 [ 247.504412][ T9654] do_syscall_64+0xf6/0x790 [ 247.508986][ T9654] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 247.514873][ T9654] RIP: 0033:0x45c849 [ 247.518778][ T9654] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 247.538395][ T9654] RSP: 002b:00007f2c672c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 247.546820][ T9654] RAX: ffffffffffffffda RBX: 00007f2c672c86d4 RCX: 000000000045c849 [ 247.554806][ T9654] RDX: 0000000020000000 RSI: 000000000000541c RDI: 0000000000000003 [ 247.562768][ T9654] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 247.570744][ T9654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 247.578707][ T9654] R13: 000000000000056e R14: 00000000004c7ff7 R15: 0000000000000000 04:28:02 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @rand_addr="100e0e188dec22c679daac3b6f3d26b3"}]}, &(0x7f0000000180)=0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000200)='fou\x00') sendmsg$FOU_CMD_GET(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14, r4, 0x389}, 0x14}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2408000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xf6e}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0xa004814) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x7c, &(0x7f0000000480)={r6}, 0x14) setsockopt$sock_int(r2, 0x1, 0x1d, &(0x7f0000000000), 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e20, 0x4, @remote, 0x4}, @in={0x2, 0x4e21, @multicast2}, @in6={0xa, 0x4e20, 0x10, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7c00}, @in6={0xa, 0x4e22, 0x9, @dev={0xfe, 0x80, [], 0x24}, 0xcb}, @in6={0xa, 0x4e24, 0x7fff, @rand_addr="066d717f8a1d823ef200", 0x3}, @in6={0xa, 0x4e23, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x40}, @in6={0xa, 0x4e22, 0x4, @ipv4={[], [], @local}, 0x200000}], 0xc8) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 04:28:02 executing program 3: write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x10000000008, 0x0) ioctl$TIOCNXCL(r1, 0x540d) close(r0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) [ 247.759461][ T9654] ERROR: Out of memory at tomoyo_realpath_from_path. 04:28:03 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010001fff0000056800080000faff0000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="0120000000000000"], 0x48}}, 0x0) r0 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r0, &(0x7f0000000000), 0x4000000000001f2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='scalable\x00', 0x9) 04:28:03 executing program 1 (fault-call:1 fault-nth:1): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) [ 247.944048][ T9668] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 04:28:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockopt$nfc_llcp(r1, 0x118, 0x9445cbf3da321eca, &(0x7f0000000100)=""/193, 0xc1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r2, &(0x7f0000000240), 0x2305e2b7) write$FUSE_CREATE_OPEN(r2, &(0x7f0000001340)={0xa0, 0x0, 0x2, {{0x800000000007}, {0x0, 0x0, 0x1000000}}}, 0xa0) [ 248.034425][ T9672] FAULT_INJECTION: forcing a failure. [ 248.034425][ T9672] name failslab, interval 1, probability 0, space 0, times 0 [ 248.068496][ T9672] CPU: 1 PID: 9672 Comm: syz-executor.1 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 248.078364][ T9672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.088416][ T9672] Call Trace: [ 248.091721][ T9672] dump_stack+0x188/0x20d [ 248.096066][ T9672] should_fail.cold+0x5/0x14 [ 248.100665][ T9672] ? setup_fault_attr+0x1e0/0x1e0 [ 248.105700][ T9672] should_failslab+0x5/0xf [ 248.110110][ T9672] __kmalloc+0x2d9/0x7a0 [ 248.114348][ T9672] ? tomoyo_encode2.part.0+0xec/0x3b0 [ 248.119800][ T9672] ? d_absolute_path+0x10c/0x160 [ 248.124738][ T9672] ? __d_path+0x140/0x140 [ 248.129067][ T9672] tomoyo_encode2.part.0+0xec/0x3b0 [ 248.134264][ T9672] tomoyo_encode+0x28/0x50 [ 248.138792][ T9672] tomoyo_realpath_from_path+0x184/0x620 [ 248.144457][ T9672] tomoyo_path_number_perm+0x1c2/0x4d0 [ 248.149912][ T9672] ? tomoyo_path_number_perm+0x17a/0x4d0 [ 248.155560][ T9672] ? tomoyo_execute_permission+0x470/0x470 [ 248.161356][ T9672] ? hlock_class+0x120/0x120 [ 248.165933][ T9672] ? hlock_class+0x120/0x120 [ 248.170512][ T9672] ? perf_trace_lock+0xeb/0x4c0 [ 248.175383][ T9672] ? __fget_files+0x307/0x4f0 [ 248.180094][ T9672] ? __fget_files+0x329/0x4f0 [ 248.184775][ T9672] ? do_dup2+0x520/0x520 [ 248.189010][ T9672] ? __sb_end_write+0x101/0x1d0 [ 248.193850][ T9672] ? vfs_write+0x15b/0x5c0 [ 248.198287][ T9672] security_file_ioctl+0x6c/0xb0 [ 248.203226][ T9672] ksys_ioctl+0x50/0x180 [ 248.207464][ T9672] __x64_sys_ioctl+0x6f/0xb0 [ 248.212055][ T9672] ? lockdep_hardirqs_on+0x417/0x5d0 [ 248.217336][ T9672] do_syscall_64+0xf6/0x790 [ 248.221851][ T9672] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 248.227732][ T9672] RIP: 0033:0x45c849 [ 248.231620][ T9672] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 248.251214][ T9672] RSP: 002b:00007f2c672c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 248.259621][ T9672] RAX: ffffffffffffffda RBX: 00007f2c672c86d4 RCX: 000000000045c849 [ 248.267595][ T9672] RDX: 0000000020000000 RSI: 000000000000541c RDI: 0000000000000003 [ 248.275836][ T9672] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 248.283816][ T9672] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 248.291777][ T9672] R13: 000000000000056e R14: 00000000004c7ff7 R15: 0000000000000001 04:28:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8040}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gre={{0x8, 0x1, 'gre\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_ENCAP_TYPE={0x6}, @IFLA_GRE_OFLAGS={0x6, 0x2, 0x3f}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x3c}]}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x50}}, 0x0) r3 = socket(0x10, 0x3, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getpeername$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r8}) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r8}]}, 0x24}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r3, &(0x7f0000000c00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000980)={0x218, 0x0, 0x10, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_LINKINFO_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @ETHTOOL_A_LINKINFO_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0xdf7ff81dbd93cdcd}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_LINKINFO_HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_LINKINFO_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}, @ETHTOOL_A_LINKINFO_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}]}]}, 0x218}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000001) sendmmsg$alg(r3, &(0x7f00000000c0), 0x49249249249265a, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') 04:28:03 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010001fff0000056800080000faff0000", @ANYRES32=0x0, @ANYBLOB="0000000000006c00280012800a00010076786c3b48deea3df9aabbd237985eb9e1616e0000001800028014000a00000000b6a1a532588b3fab0ebbc757c7bc7f458168a5d5a12af6f4cebbba3a6b286cc70230251b0cfaec50864c60e23dabdda2e67d7a4e7c06c890f9a743e6f13478271324a5bc11a66f58da307bdbe2b64a51049767bf30c6524ff2a293d37025b54c1163a11c1b66a46df20c47521961a8f7e23e9a38f3d99113ad34567f151708bf78872798eb31aaf2f800e59d557d3830ba67e7bbd2f6a65fa16fa34ec5ee9f2e0124a9b8796215fcb3e39b4494abbfaf98d7f99b9db45ba5167ffa3d20b6f65b065fbd8f06311a95efaf368a1234dfeda68869127f359e84ebfb1ec222409b2201872ca292d9fccce4336ea7be11506577414cdc9433a3971bc9a867443c29ea364c07716725a33743418788377acbae64b440c802345aeb76e384e3ac63971e8b3393aef3e66f67dfe317001ebf2cd8d12380f1560642a94096e00b6d38352ac392c8c3490cfe6d12bde89727c6d28267c40d76eb42b8102039fa6179211b02d6e1210712418b5cee5ae059b0f25e35450c617e908fb23f07f492b1c9ebb8baaf49f1ab9942c2d9fcfea6388cf820d83b4aafeb6dfed721247b8bc400c0a2ed3e8cdf91aa5b4ec9b1cecf5ead22c3429d3bc706865e2d944b477dd1528a9377550c8cac0021dd00955438cfe1ec714eebf6520fdc9857ba451bd39b3027097627c52a120bf2abaedd3d57da5f8ec509bcbff0034d9e188d14c7cf34e2135eb019108bacfb39488d7eb2c97bbe8274c0e7ce5d5b953afa2d8e137ffff2c933621ea131f4f38e51e5d9363b6038662eb9986ff15073dca0102aaa6860006b3bcfdecbf533", @ANYRES32=0x0, @ANYBLOB="0120000000000000"], 0x48}}, 0x0) r0 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r0, &(0x7f0000000000), 0x4000000000001f2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='scalable\x00', 0x9) [ 248.372380][ T9675] CUSE: info not properly terminated [ 248.404985][ T9679] CUSE: info not properly terminated [ 248.422532][ T9681] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 04:28:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockopt$nfc_llcp(r1, 0x118, 0x9445cbf3da321eca, &(0x7f0000000100)=""/193, 0xc1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r2, &(0x7f0000000240), 0x2305e2b7) write$FUSE_CREATE_OPEN(r2, &(0x7f0000001340)={0xa0, 0x0, 0x2, {{0x800000000007}, {0x0, 0x0, 0x1000000}}}, 0xa0) [ 248.548755][ T9672] ERROR: Out of memory at tomoyo_realpath_from_path. 04:28:03 executing program 1 (fault-call:1 fault-nth:2): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) [ 248.607130][ T9688] CUSE: info not properly terminated 04:28:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x374}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x0, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fbac141410e949eb4be1977d48", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 04:28:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e6b00002c00056bd2e9fcf8c11a057d0439e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r6}) r7 = semget$private(0x0, 0x4, 0x461) semctl$GETNCNT(r7, 0x1, 0xe, &(0x7f0000000340)=""/233) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r6}]}, 0x24}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)=@delqdisc={0xe8, 0x25, 0x4, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, r6, {0x8, 0xffe0}, {0x10, 0xf}, {0x5, 0x1}}, [@TCA_INGRESS_BLOCK={0x8, 0xd, 0x800}, @qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x24, 0x2, [@TCA_HHF_BACKLOG_LIMIT={0x8, 0x1, 0x3c}, @TCA_HHF_NON_HH_WEIGHT={0x8, 0x7, 0x7}, @TCA_HHF_EVICT_TIMEOUT={0x8, 0x6, 0x7}, @TCA_HHF_QUANTUM={0x8, 0x2, 0x7}]}}, @TCA_STAB={0x50, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x5, 0x6, 0x6, 0x0, 0x0, 0x7, 0x9, 0x3}}, {0xa, 0x2, [0x4, 0x6, 0x8861]}}, {{0x1c, 0x1, {0x3, 0x9, 0x40, 0x100, 0x0, 0x7, 0x6, 0x2}}, {0x8, 0x2, [0x0, 0x0]}}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x8}, @qdisc_kind_options=@q_bfifo={{0xa, 0x1, 'bfifo\x00'}, {0x8, 0x2, 0x1}}, @qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x14, 0x2, [@TCA_HHF_EVICT_TIMEOUT={0x8, 0x6, 0x3}, @TCA_HHF_ADMIT_BYTES={0x8, 0x5, 0x80}]}}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x5}]}, 0xe8}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) 04:28:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockopt$nfc_llcp(r1, 0x118, 0x9445cbf3da321eca, &(0x7f0000000100)=""/193, 0xc1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r2, &(0x7f0000000240), 0x2305e2b7) write$FUSE_CREATE_OPEN(r2, &(0x7f0000001340)={0xa0, 0x0, 0x2, {{0x800000000007}, {0x0, 0x0, 0x1000000}}}, 0xa0) 04:28:04 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) [ 248.903495][ T9706] CUSE: info not properly terminated 04:28:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e6b00002c00056bd2e9fcf8c11a057d0439e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r6}) r7 = semget$private(0x0, 0x4, 0x461) semctl$GETNCNT(r7, 0x1, 0xe, &(0x7f0000000340)=""/233) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r6}]}, 0x24}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)=@delqdisc={0xe8, 0x25, 0x4, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, r6, {0x8, 0xffe0}, {0x10, 0xf}, {0x5, 0x1}}, [@TCA_INGRESS_BLOCK={0x8, 0xd, 0x800}, @qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x24, 0x2, [@TCA_HHF_BACKLOG_LIMIT={0x8, 0x1, 0x3c}, @TCA_HHF_NON_HH_WEIGHT={0x8, 0x7, 0x7}, @TCA_HHF_EVICT_TIMEOUT={0x8, 0x6, 0x7}, @TCA_HHF_QUANTUM={0x8, 0x2, 0x7}]}}, @TCA_STAB={0x50, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x5, 0x6, 0x6, 0x0, 0x0, 0x7, 0x9, 0x3}}, {0xa, 0x2, [0x4, 0x6, 0x8861]}}, {{0x1c, 0x1, {0x3, 0x9, 0x40, 0x100, 0x0, 0x7, 0x6, 0x2}}, {0x8, 0x2, [0x0, 0x0]}}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x8}, @qdisc_kind_options=@q_bfifo={{0xa, 0x1, 'bfifo\x00'}, {0x8, 0x2, 0x1}}, @qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x14, 0x2, [@TCA_HHF_EVICT_TIMEOUT={0x8, 0x6, 0x3}, @TCA_HHF_ADMIT_BYTES={0x8, 0x5, 0x80}]}}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x5}]}, 0xe8}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) 04:28:04 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e6b00002c00056bd2e9fcf8c11a057d0439e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r6}) r7 = semget$private(0x0, 0x4, 0x461) semctl$GETNCNT(r7, 0x1, 0xe, &(0x7f0000000340)=""/233) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r6}]}, 0x24}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)=@delqdisc={0xe8, 0x25, 0x4, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, r6, {0x8, 0xffe0}, {0x10, 0xf}, {0x5, 0x1}}, [@TCA_INGRESS_BLOCK={0x8, 0xd, 0x800}, @qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x24, 0x2, [@TCA_HHF_BACKLOG_LIMIT={0x8, 0x1, 0x3c}, @TCA_HHF_NON_HH_WEIGHT={0x8, 0x7, 0x7}, @TCA_HHF_EVICT_TIMEOUT={0x8, 0x6, 0x7}, @TCA_HHF_QUANTUM={0x8, 0x2, 0x7}]}}, @TCA_STAB={0x50, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x5, 0x6, 0x6, 0x0, 0x0, 0x7, 0x9, 0x3}}, {0xa, 0x2, [0x4, 0x6, 0x8861]}}, {{0x1c, 0x1, {0x3, 0x9, 0x40, 0x100, 0x0, 0x7, 0x6, 0x2}}, {0x8, 0x2, [0x0, 0x0]}}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x8}, @qdisc_kind_options=@q_bfifo={{0xa, 0x1, 'bfifo\x00'}, {0x8, 0x2, 0x1}}, @qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x14, 0x2, [@TCA_HHF_EVICT_TIMEOUT={0x8, 0x6, 0x3}, @TCA_HHF_ADMIT_BYTES={0x8, 0x5, 0x80}]}}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x5}]}, 0xe8}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) 04:28:04 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000100)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setrlimit(0x7, &(0x7f00000000c0)={0xd5, 0xfffffffffffffffc}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000040)=0x1, 0x4) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) uname(&(0x7f0000000140)=""/123) 04:28:04 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x2, &(0x7f0000000000)) 04:28:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8040}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gre={{0x8, 0x1, 'gre\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_ENCAP_TYPE={0x6}, @IFLA_GRE_OFLAGS={0x6, 0x2, 0x3f}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x3c}]}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x50}}, 0x0) r3 = socket(0x10, 0x3, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getpeername$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r8}) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r8}]}, 0x24}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r3, &(0x7f0000000c00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000980)={0x218, 0x0, 0x10, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_LINKINFO_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @ETHTOOL_A_LINKINFO_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0xdf7ff81dbd93cdcd}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_LINKINFO_HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_LINKINFO_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}, @ETHTOOL_A_LINKINFO_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}]}]}, 0x218}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000001) sendmmsg$alg(r3, &(0x7f00000000c0), 0x49249249249265a, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') 04:28:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e6b00002c00056bd2e9fcf8c11a057d0439e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r6}) r7 = semget$private(0x0, 0x4, 0x461) semctl$GETNCNT(r7, 0x1, 0xe, &(0x7f0000000340)=""/233) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r6}]}, 0x24}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)=@delqdisc={0xe8, 0x25, 0x4, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, r6, {0x8, 0xffe0}, {0x10, 0xf}, {0x5, 0x1}}, [@TCA_INGRESS_BLOCK={0x8, 0xd, 0x800}, @qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x24, 0x2, [@TCA_HHF_BACKLOG_LIMIT={0x8, 0x1, 0x3c}, @TCA_HHF_NON_HH_WEIGHT={0x8, 0x7, 0x7}, @TCA_HHF_EVICT_TIMEOUT={0x8, 0x6, 0x7}, @TCA_HHF_QUANTUM={0x8, 0x2, 0x7}]}}, @TCA_STAB={0x50, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x5, 0x6, 0x6, 0x0, 0x0, 0x7, 0x9, 0x3}}, {0xa, 0x2, [0x4, 0x6, 0x8861]}}, {{0x1c, 0x1, {0x3, 0x9, 0x40, 0x100, 0x0, 0x7, 0x6, 0x2}}, {0x8, 0x2, [0x0, 0x0]}}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x8}, @qdisc_kind_options=@q_bfifo={{0xa, 0x1, 'bfifo\x00'}, {0x8, 0x2, 0x1}}, @qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x14, 0x2, [@TCA_HHF_EVICT_TIMEOUT={0x8, 0x6, 0x3}, @TCA_HHF_ADMIT_BYTES={0x8, 0x5, 0x80}]}}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x5}]}, 0xe8}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) 04:28:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8040}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gre={{0x8, 0x1, 'gre\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_ENCAP_TYPE={0x6}, @IFLA_GRE_OFLAGS={0x6, 0x2, 0x3f}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x3c}]}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x50}}, 0x0) r3 = socket(0x10, 0x3, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getpeername$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r8}) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r8}]}, 0x24}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r3, &(0x7f0000000c00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000980)={0x218, 0x0, 0x10, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_LINKINFO_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @ETHTOOL_A_LINKINFO_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0xdf7ff81dbd93cdcd}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_LINKINFO_HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_LINKINFO_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}, @ETHTOOL_A_LINKINFO_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}]}]}, 0x218}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000001) sendmmsg$alg(r3, &(0x7f00000000c0), 0x49249249249265a, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') 04:28:04 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x10, &(0x7f0000000000)) [ 249.342628][ T9726] team0: Device gre1 is of different type 04:28:04 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b2f, &(0x7f0000000000)) 04:28:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e6b00002c00056bd2e9fcf8c11a057d0439e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r6}) r7 = semget$private(0x0, 0x4, 0x461) semctl$GETNCNT(r7, 0x1, 0xe, &(0x7f0000000340)=""/233) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r6}]}, 0x24}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)=@delqdisc={0xe8, 0x25, 0x4, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, r6, {0x8, 0xffe0}, {0x10, 0xf}, {0x5, 0x1}}, [@TCA_INGRESS_BLOCK={0x8, 0xd, 0x800}, @qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x24, 0x2, [@TCA_HHF_BACKLOG_LIMIT={0x8, 0x1, 0x3c}, @TCA_HHF_NON_HH_WEIGHT={0x8, 0x7, 0x7}, @TCA_HHF_EVICT_TIMEOUT={0x8, 0x6, 0x7}, @TCA_HHF_QUANTUM={0x8, 0x2, 0x7}]}}, @TCA_STAB={0x50, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x5, 0x6, 0x6, 0x0, 0x0, 0x7, 0x9, 0x3}}, {0xa, 0x2, [0x4, 0x6, 0x8861]}}, {{0x1c, 0x1, {0x3, 0x9, 0x40, 0x100, 0x0, 0x7, 0x6, 0x2}}, {0x8, 0x2, [0x0, 0x0]}}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x8}, @qdisc_kind_options=@q_bfifo={{0xa, 0x1, 'bfifo\x00'}, {0x8, 0x2, 0x1}}, @qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x14, 0x2, [@TCA_HHF_EVICT_TIMEOUT={0x8, 0x6, 0x3}, @TCA_HHF_ADMIT_BYTES={0x8, 0x5, 0x80}]}}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x5}]}, 0xe8}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) 04:28:04 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b30, &(0x7f0000000000)) 04:28:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e6b00002c00056bd2e9fcf8c11a057d0439e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r5}) r6 = semget$private(0x0, 0x4, 0x461) semctl$GETNCNT(r6, 0x1, 0xe, &(0x7f0000000340)=""/233) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r5}]}, 0x24}}, 0x0) 04:28:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8040}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gre={{0x8, 0x1, 'gre\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_ENCAP_TYPE={0x6}, @IFLA_GRE_OFLAGS={0x6, 0x2, 0x3f}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x3c}]}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x50}}, 0x0) r3 = socket(0x10, 0x3, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getpeername$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r8}) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r8}]}, 0x24}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r3, &(0x7f0000000c00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000980)={0x218, 0x0, 0x10, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_LINKINFO_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @ETHTOOL_A_LINKINFO_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0xdf7ff81dbd93cdcd}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_LINKINFO_HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_LINKINFO_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}, @ETHTOOL_A_LINKINFO_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}]}]}, 0x218}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000001) sendmmsg$alg(r3, &(0x7f00000000c0), 0x49249249249265a, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') 04:28:05 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b31, &(0x7f0000000000)) 04:28:05 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000100)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setrlimit(0x7, &(0x7f00000000c0)={0xd5, 0xfffffffffffffffc}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000040)=0x1, 0x4) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) uname(&(0x7f0000000140)=""/123) 04:28:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8040}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gre={{0x8, 0x1, 'gre\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_ENCAP_TYPE={0x6}, @IFLA_GRE_OFLAGS={0x6, 0x2, 0x3f}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x3c}]}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x50}}, 0x0) r3 = socket(0x10, 0x3, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getpeername$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r8}) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r8}]}, 0x24}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r3, &(0x7f0000000c00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000980)={0x218, 0x0, 0x10, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_LINKINFO_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @ETHTOOL_A_LINKINFO_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0xdf7ff81dbd93cdcd}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_LINKINFO_HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_LINKINFO_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}, @ETHTOOL_A_LINKINFO_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}]}]}, 0x218}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000001) sendmmsg$alg(r3, &(0x7f00000000c0), 0x49249249249265a, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') 04:28:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e6b00002c00056bd2e9fcf8c11a057d0439e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r4}) r5 = semget$private(0x0, 0x4, 0x461) semctl$GETNCNT(r5, 0x1, 0xe, &(0x7f0000000340)=""/233) 04:28:05 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b32, &(0x7f0000000000)) 04:28:05 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b33, &(0x7f0000000000)) 04:28:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e6b00002c00056bd2e9fcf8c11a057d0439e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r4}) semctl$GETNCNT(0x0, 0x1, 0xe, &(0x7f0000000340)=""/233) 04:28:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8040}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gre={{0x8, 0x1, 'gre\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_ENCAP_TYPE={0x6}, @IFLA_GRE_OFLAGS={0x6, 0x2, 0x3f}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x3c}]}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x50}}, 0x0) r3 = socket(0x10, 0x3, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getpeername$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r8}) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r8}]}, 0x24}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r3, &(0x7f0000000c00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000980)={0x218, 0x0, 0x10, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_LINKINFO_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @ETHTOOL_A_LINKINFO_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0xdf7ff81dbd93cdcd}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_LINKINFO_HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_LINKINFO_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}, @ETHTOOL_A_LINKINFO_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}]}]}, 0x218}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000001) sendmmsg$alg(r3, &(0x7f00000000c0), 0x49249249249265a, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') 04:28:05 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b34, &(0x7f0000000000)) 04:28:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e6b00002c00056bd2e9fcf8c11a057d0439e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) semctl$GETNCNT(0x0, 0x1, 0xe, &(0x7f0000000340)=""/233) 04:28:05 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b35, &(0x7f0000000000)) 04:28:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b33, &(0x7f0000000000)) 04:28:06 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000100)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setrlimit(0x7, &(0x7f00000000c0)={0xd5, 0xfffffffffffffffc}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000040)=0x1, 0x4) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) uname(&(0x7f0000000140)=""/123) 04:28:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e6b00002c00056bd2e9fcf8c11a057d0439e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) semctl$GETNCNT(0x0, 0x1, 0xe, &(0x7f0000000340)=""/233) 04:28:06 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b36, &(0x7f0000000000)) 04:28:06 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b33, &(0x7f0000000000)) 04:28:06 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b32, &(0x7f0000000000)) 04:28:06 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b33, &(0x7f0000000000)) 04:28:06 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b37, &(0x7f0000000000)) 04:28:06 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b32, &(0x7f0000000000)) 04:28:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e6b00002c00056bd2e9fcf8c11a057d0439e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) semctl$GETNCNT(0x0, 0x1, 0xe, &(0x7f0000000340)=""/233) 04:28:06 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b31, &(0x7f0000000000)) 04:28:06 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b32, &(0x7f0000000000)) 04:28:06 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b3a, &(0x7f0000000000)) 04:28:06 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e6b00002c00056bd2e9fcf8c11a057d0439e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r5}) r6 = semget$private(0x0, 0x4, 0x461) semctl$GETNCNT(r6, 0x1, 0xe, &(0x7f0000000340)=""/233) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r5}]}, 0x24}}, 0x0) 04:28:06 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000100)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setrlimit(0x7, &(0x7f00000000c0)={0xd5, 0xfffffffffffffffc}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000040)=0x1, 0x4) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) uname(&(0x7f0000000140)=""/123) 04:28:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e6b00002c00056bd2e9fcf8c11a057d0439e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) semctl$GETNCNT(0x0, 0x1, 0xe, &(0x7f0000000340)=""/233) 04:28:06 executing program 2: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b32, &(0x7f0000000000)) 04:28:06 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b3b, &(0x7f0000000000)) 04:28:07 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b3c, &(0x7f0000000000)) 04:28:07 executing program 2: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b32, &(0x7f0000000000)) 04:28:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e6b00002c00056bd2e9fcf8c11a057d0439e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$nl_route(0x10, 0x3, 0x0) semctl$GETNCNT(0x0, 0x1, 0xe, &(0x7f0000000340)=""/233) 04:28:07 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e6b00002c00056bd2e9fcf8c11a057d0439e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r5}) r6 = semget$private(0x0, 0x4, 0x461) semctl$GETNCNT(r6, 0x1, 0xe, &(0x7f0000000340)=""/233) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r5}]}, 0x24}}, 0x0) 04:28:07 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b3d, &(0x7f0000000000)) 04:28:07 executing program 2: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b32, &(0x7f0000000000)) 04:28:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e6b00002c00056bd2e9fcf8c11a057d0439e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) creat(&(0x7f0000000040)='./file0\x00', 0x0) semctl$GETNCNT(0x0, 0x1, 0xe, &(0x7f0000000340)=""/233) 04:28:07 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b32, &(0x7f0000000000)) 04:28:07 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000100)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setrlimit(0x7, &(0x7f00000000c0)={0xd5, 0xfffffffffffffffc}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000040)=0x1, 0x4) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:07 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e6b00002c00056bd2e9fcf8c11a057d0439e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r5}) r6 = semget$private(0x0, 0x4, 0x461) semctl$GETNCNT(r6, 0x1, 0xe, &(0x7f0000000340)=""/233) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r5}]}, 0x24}}, 0x0) 04:28:07 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b40, &(0x7f0000000000)) 04:28:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e6b00002c00056bd2e9fcf8c11a057d0439e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) semctl$GETNCNT(0x0, 0x1, 0xe, &(0x7f0000000340)=""/233) 04:28:07 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b32, &(0x7f0000000000)) 04:28:07 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b41, &(0x7f0000000000)) 04:28:07 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b32, &(0x7f0000000000)) 04:28:07 executing program 0: socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETNCNT(0x0, 0x1, 0xe, &(0x7f0000000340)=""/233) 04:28:08 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e6b00002c00056bd2e9fcf8c11a057d0439e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r5}) semget$private(0x0, 0x4, 0x461) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r5}]}, 0x24}}, 0x0) 04:28:08 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b44, &(0x7f0000000000)) 04:28:08 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b32, &(0x7f0000000000)) 04:28:08 executing program 0: socket$kcm(0x10, 0x2, 0x10) semctl$GETNCNT(0x0, 0x1, 0xe, &(0x7f0000000340)=""/233) 04:28:08 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000100)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setrlimit(0x7, &(0x7f00000000c0)={0xd5, 0xfffffffffffffffc}) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:08 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e6b00002c00056bd2e9fcf8c11a057d0439e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r5}) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r5}]}, 0x24}}, 0x0) 04:28:08 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b32, 0x0) 04:28:08 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b45, &(0x7f0000000000)) 04:28:08 executing program 0: semctl$GETNCNT(0x0, 0x1, 0xe, &(0x7f0000000340)=""/233) 04:28:08 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b32, 0x0) 04:28:08 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b46, &(0x7f0000000000)) 04:28:08 executing program 0: semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000340)=""/233) 04:28:08 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e6b00002c00056bd2e9fcf8c11a057d0439e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r5}) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r5}]}, 0x24}}, 0x0) 04:28:08 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b47, &(0x7f0000000000)) 04:28:08 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b32, 0x0) 04:28:08 executing program 0: semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 04:28:09 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000100)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:09 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b48, &(0x7f0000000000)) 04:28:09 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e6b00002c00056bd2e9fcf8c11a057d0439e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r4}]}, 0x24}}, 0x0) 04:28:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e6b00002c00056bd2e9fcf8c11a057d0439e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r5}) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r5}]}, 0x24}}, 0x0) 04:28:09 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b45, &(0x7f0000000000)) 04:28:09 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e6b00002c00056bd2e9fcf8c11a057d0439e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r5}) semget$private(0x0, 0x4, 0x461) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r5}]}, 0x24}}, 0x0) 04:28:09 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b49, &(0x7f0000000000)) 04:28:09 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e6b00002c00056bd2e9fcf8c11a057d0439e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) 04:28:09 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b48, &(0x7f0000000000)) 04:28:09 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4a, &(0x7f0000000000)) 04:28:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8040}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gre={{0x8, 0x1, 'gre\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_ENCAP_TYPE={0x6}, @IFLA_GRE_OFLAGS={0x6, 0x2, 0x3f}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x3c}]}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x50}}, 0x0) r3 = socket(0x10, 0x3, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getpeername$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r8}) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r8}]}, 0x24}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r3, &(0x7f0000000c00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000980)={0x218, 0x0, 0x10, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_LINKINFO_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @ETHTOOL_A_LINKINFO_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0xdf7ff81dbd93cdcd}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_LINKINFO_HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_LINKINFO_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}, @ETHTOOL_A_LINKINFO_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}]}]}, 0x218}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000001) sendmmsg$alg(r3, &(0x7f00000000c0), 0x49249249249265a, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') 04:28:09 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e6b00002c00056bd2e9fcf8c11a057d0439e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) 04:28:09 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000100)=0x9, 0x4) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8040}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gre={{0x8, 0x1, 'gre\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_ENCAP_TYPE={0x6}, @IFLA_GRE_OFLAGS={0x6, 0x2, 0x3f}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x3c}]}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x50}}, 0x0) r3 = socket(0x10, 0x3, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getpeername$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r8}) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r8}]}, 0x24}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r3, &(0x7f0000000c00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000980)={0x218, 0x0, 0x10, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_LINKINFO_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @ETHTOOL_A_LINKINFO_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0xdf7ff81dbd93cdcd}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_LINKINFO_HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_LINKINFO_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}, @ETHTOOL_A_LINKINFO_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}]}]}, 0x218}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000001) sendmmsg$alg(r3, &(0x7f00000000c0), 0x49249249249265a, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') 04:28:09 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4b, &(0x7f0000000000)) 04:28:09 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e6b00002c00056bd2e9fcf8c11a057d0439e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) 04:28:10 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4c, &(0x7f0000000000)) 04:28:10 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000100)=0x9, 0x4) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:10 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4b, &(0x7f0000000000)) 04:28:10 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e6b00002c00056bd2e9fcf8c11a057d0439e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) 04:28:10 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4d, &(0x7f0000000000)) 04:28:10 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000100)=0x9, 0x4) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:10 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4b, &(0x7f0000000000)) 04:28:10 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4e, &(0x7f0000000000)) 04:28:10 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4c, &(0x7f0000000000)) 04:28:10 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e6b00002c00056bd2e9fcf8c11a057d0439e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) 04:28:10 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4b, &(0x7f0000000000)) 04:28:10 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:10 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b52, &(0x7f0000000000)) 04:28:10 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4c, &(0x7f0000000000)) 04:28:10 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e6b00002c00056bd2e9fcf8c11a057d0439e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) creat(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) 04:28:10 executing program 2: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b4b, &(0x7f0000000000)) 04:28:11 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b60, &(0x7f0000000000)) 04:28:11 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4c, &(0x7f0000000000)) 04:28:11 executing program 2: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b4b, &(0x7f0000000000)) 04:28:11 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b61, &(0x7f0000000000)) 04:28:11 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e6b00002c00056bd2e9fcf8c11a057d0439e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) creat(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) 04:28:11 executing program 2: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b4b, &(0x7f0000000000)) 04:28:11 executing program 0: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b4c, &(0x7f0000000000)) 04:28:11 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:11 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4b, &(0x7f0000000000)) 04:28:11 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e6b00002c00056bd2e9fcf8c11a057d0439e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) creat(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) 04:28:11 executing program 0: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b4c, &(0x7f0000000000)) 04:28:11 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b4b, &(0x7f0000000000)) 04:28:11 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:11 executing program 0: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b4c, &(0x7f0000000000)) 04:28:11 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b62, &(0x7f0000000000)) 04:28:11 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e6b00002c00056bd2e9fcf8c11a057d0439e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) 04:28:11 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:11 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b4b, &(0x7f0000000000)) 04:28:12 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4c, &(0x7f0000000000)) 04:28:12 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b63, &(0x7f0000000000)) 04:28:12 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b4b, &(0x7f0000000000)) 04:28:12 executing program 3: socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) 04:28:12 executing program 4: bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:12 executing program 0: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b4c, &(0x7f0000000000)) 04:28:12 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b64, &(0x7f0000000000)) 04:28:12 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4b, 0x0) 04:28:12 executing program 3: socket$kcm(0x10, 0x2, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) 04:28:12 executing program 4: bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:12 executing program 0: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b4c, &(0x7f0000000000)) 04:28:12 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b65, &(0x7f0000000000)) 04:28:12 executing program 0: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b4c, &(0x7f0000000000)) 04:28:12 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4b, 0x0) 04:28:12 executing program 3: socket$kcm(0x10, 0x2, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) 04:28:12 executing program 4: bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:12 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b66, &(0x7f0000000000)) 04:28:12 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4b, 0x0) 04:28:12 executing program 3: socket$kcm(0x10, 0x2, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) 04:28:12 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:12 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4c, 0x0) 04:28:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) 04:28:13 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b67, &(0x7f0000000000)) 04:28:13 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4a, &(0x7f0000000000)) 04:28:13 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:13 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4c, 0x0) 04:28:13 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4c, 0x0) 04:28:13 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b68, &(0x7f0000000000)) 04:28:13 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4c, 0x0) 04:28:13 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:13 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) 04:28:13 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b69, &(0x7f0000000000)) 04:28:13 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4c, 0x0) 04:28:13 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) 04:28:13 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4c, 0x0) 04:28:13 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:13 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b6a, &(0x7f0000000000)) 04:28:13 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4c, 0x0) 04:28:13 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) 04:28:13 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4c, 0x0) 04:28:13 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b6b, &(0x7f0000000000)) [ 258.744412][T10235] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 04:28:14 executing program 2: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b4c, 0x0) 04:28:14 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) 04:28:14 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4c, 0x0) 04:28:14 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b6c, &(0x7f0000000000)) 04:28:14 executing program 2: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b4c, 0x0) 04:28:14 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) 04:28:14 executing program 0: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b4c, 0x0) 04:28:14 executing program 2: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b4c, 0x0) 04:28:14 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b6d, &(0x7f0000000000)) 04:28:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) 04:28:14 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:14 executing program 0: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b4c, 0x0) 04:28:14 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4c, 0x0) 04:28:14 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b70, &(0x7f0000000000)) 04:28:14 executing program 0: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b4c, 0x0) 04:28:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) 04:28:14 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b4c, 0x0) 04:28:14 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:14 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b71, &(0x7f0000000000)) 04:28:14 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4c, 0x0) 04:28:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) 04:28:14 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b4c, 0x0) 04:28:15 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b72, &(0x7f0000000000)) 04:28:15 executing program 0: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b4c, 0x0) 04:28:15 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b4c, 0x0) 04:28:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) 04:28:15 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:15 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4bfa, &(0x7f0000000000)) 04:28:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) 04:28:15 executing program 0: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b4c, 0x0) 04:28:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) 04:28:15 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4bfb, &(0x7f0000000000)) 04:28:15 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:15 executing program 0: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b4c, 0x0) 04:28:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8040}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gre={{0x8, 0x1, 'gre\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_ENCAP_TYPE={0x6}, @IFLA_GRE_OFLAGS={0x6, 0x2, 0x3f}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x3c}]}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x50}}, 0x0) r3 = socket(0x10, 0x3, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getpeername$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r8}) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r8}]}, 0x24}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r3, &(0x7f0000000c00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000980)={0x218, 0x0, 0x10, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_LINKINFO_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @ETHTOOL_A_LINKINFO_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0xdf7ff81dbd93cdcd}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_LINKINFO_HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_LINKINFO_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}, @ETHTOOL_A_LINKINFO_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}]}]}, 0x218}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000001) sendmmsg$alg(r3, &(0x7f00000000c0), 0x49249249249265a, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') 04:28:15 executing program 0 (fault-call:1 fault-nth:0): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4c, 0x0) 04:28:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) 04:28:15 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4c01, &(0x7f0000000000)) 04:28:15 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) [ 260.576633][T10365] FAULT_INJECTION: forcing a failure. [ 260.576633][T10365] name failslab, interval 1, probability 0, space 0, times 0 [ 260.638686][T10365] CPU: 0 PID: 10365 Comm: syz-executor.0 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 260.648639][T10365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.658709][T10365] Call Trace: [ 260.662032][T10365] dump_stack+0x188/0x20d [ 260.666391][T10365] should_fail.cold+0x5/0x14 [ 260.671003][T10365] ? setup_fault_attr+0x1e0/0x1e0 [ 260.676065][T10365] should_failslab+0x5/0xf [ 260.680492][T10365] __kmalloc+0x2d9/0x7a0 [ 260.684751][T10365] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 260.690747][T10365] ? tomoyo_realpath_from_path+0xc2/0x620 [ 260.696489][T10365] ? mark_lock+0xbc/0x1220 [ 260.700925][T10365] ? _kstrtoull+0x13f/0x1f0 [ 260.705454][T10365] tomoyo_realpath_from_path+0xc2/0x620 [ 260.711019][T10365] ? tomoyo_path_number_perm+0x17a/0x4d0 [ 260.716681][T10365] tomoyo_path_number_perm+0x1c2/0x4d0 [ 260.722152][T10365] ? tomoyo_path_number_perm+0x17a/0x4d0 [ 260.727803][T10365] ? tomoyo_execute_permission+0x470/0x470 [ 260.733616][T10365] ? hlock_class+0x120/0x120 [ 260.738213][T10365] ? hlock_class+0x120/0x120 [ 260.742814][T10365] ? perf_trace_lock+0xeb/0x4c0 [ 260.747695][T10365] ? __fget_files+0x307/0x4f0 [ 260.752426][T10365] ? __fget_files+0x329/0x4f0 [ 260.757133][T10365] ? do_dup2+0x520/0x520 [ 260.761388][T10365] ? __sb_end_write+0x101/0x1d0 [ 260.766257][T10365] ? vfs_write+0x15b/0x5c0 [ 260.770697][T10365] security_file_ioctl+0x6c/0xb0 [ 260.775653][T10365] ksys_ioctl+0x50/0x180 [ 260.779915][T10365] __x64_sys_ioctl+0x6f/0xb0 [ 260.784514][T10365] ? lockdep_hardirqs_on+0x417/0x5d0 [ 260.789817][T10365] do_syscall_64+0xf6/0x790 [ 260.794347][T10365] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 260.800244][T10365] RIP: 0033:0x45c849 [ 260.804150][T10365] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 260.823764][T10365] RSP: 002b:00007f9301dc7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 04:28:16 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:16 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5409, &(0x7f0000000000)) 04:28:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) [ 260.832191][T10365] RAX: ffffffffffffffda RBX: 00007f9301dc86d4 RCX: 000000000045c849 [ 260.840172][T10365] RDX: 0000000000000000 RSI: 0000000000004b4c RDI: 0000000000000003 [ 260.848160][T10365] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 260.856142][T10365] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 260.864129][T10365] R13: 000000000000056e R14: 00000000004c7ff7 R15: 0000000000000000 04:28:16 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x540b, &(0x7f0000000000)) 04:28:16 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000), 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) [ 261.150532][T10365] ERROR: Out of memory at tomoyo_realpath_from_path. 04:28:16 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x540c, &(0x7f0000000000)) 04:28:16 executing program 2 (fault-call:1 fault-nth:0): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4c, 0x0) [ 261.410876][T10398] FAULT_INJECTION: forcing a failure. [ 261.410876][T10398] name failslab, interval 1, probability 0, space 0, times 0 [ 261.468389][T10398] CPU: 1 PID: 10398 Comm: syz-executor.2 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 261.478329][T10398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.488390][T10398] Call Trace: [ 261.491696][T10398] dump_stack+0x188/0x20d [ 261.496048][T10398] should_fail.cold+0x5/0x14 [ 261.500654][T10398] ? setup_fault_attr+0x1e0/0x1e0 [ 261.505708][T10398] should_failslab+0x5/0xf [ 261.510139][T10398] __kmalloc+0x2d9/0x7a0 [ 261.514395][T10398] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 261.520380][T10398] ? tomoyo_realpath_from_path+0xc2/0x620 [ 261.526115][T10398] ? mark_lock+0xbc/0x1220 [ 261.530539][T10398] ? _kstrtoull+0x13f/0x1f0 [ 261.535072][T10398] tomoyo_realpath_from_path+0xc2/0x620 [ 261.540632][T10398] ? tomoyo_path_number_perm+0x17a/0x4d0 [ 261.546281][T10398] tomoyo_path_number_perm+0x1c2/0x4d0 [ 261.551742][T10398] ? tomoyo_path_number_perm+0x17a/0x4d0 [ 261.557383][T10398] ? tomoyo_execute_permission+0x470/0x470 [ 261.563199][T10398] ? get_pid_task+0x116/0x200 [ 261.567896][T10398] ? __fget_files+0x307/0x4f0 [ 261.572611][T10398] ? __fget_files+0x329/0x4f0 [ 261.577304][T10398] ? do_dup2+0x520/0x520 [ 261.581553][T10398] ? __sb_end_write+0x101/0x1d0 [ 261.586406][T10398] ? vfs_write+0x15b/0x5c0 [ 261.590963][T10398] security_file_ioctl+0x6c/0xb0 [ 261.595911][T10398] ksys_ioctl+0x50/0x180 [ 261.600166][T10398] __x64_sys_ioctl+0x6f/0xb0 [ 261.604760][T10398] ? lockdep_hardirqs_on+0x417/0x5d0 [ 261.610051][T10398] do_syscall_64+0xf6/0x790 [ 261.614569][T10398] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.620462][T10398] RIP: 0033:0x45c849 [ 261.624354][T10398] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 261.643960][T10398] RSP: 002b:00007f3b2dc61c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 261.652382][T10398] RAX: ffffffffffffffda RBX: 00007f3b2dc626d4 RCX: 000000000045c849 [ 261.660367][T10398] RDX: 0000000000000000 RSI: 0000000000004b4c RDI: 0000000000000003 [ 261.668366][T10398] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 261.676341][T10398] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 261.684316][T10398] R13: 000000000000056e R14: 00000000004c7ff7 R15: 0000000000000000 04:28:16 executing program 0 (fault-call:1 fault-nth:1): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4c, 0x0) [ 261.727121][T10398] ERROR: Out of memory at tomoyo_realpath_from_path. 04:28:16 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000), 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 04:28:16 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x540d, &(0x7f0000000000)) 04:28:16 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x8, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000000000000000006110a800000000009500000000000000594279c93a94cd0a1da541a702f3452a37df7f2454db263998f97ee4091cfe4f7a73f29f9a1ef485315b3d4bf170ed2b4cc73609cfe6001b8dd9cf11a9b82d35f87f21f1004755385ddb20f6adb61b5b58dfa6bbc03bdcc4e32c6875e809a25796a3603a1255dda1f85a8900cc032e830d32c510018a80b098340c147060ff8807f2a0f58362b3f3d807529275d710f198a801adc52b3d35bfbbc2c56b42b7487214"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0xdba3dd835d632dde}, 0x48) r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0xe0, 0x8800) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x10000000008, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000180)={0x0}) r4 = syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r4, 0xc0585605, &(0x7f0000000040)={0x0, 0x2}) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) write$binfmt_misc(r5, &(0x7f0000000280)={'syz0'}, 0x4) ioctl$VIDIOC_QBUF(r4, 0xc058560f, &(0x7f00000001c0)={0x4, 0x3, 0x4, 0x80000020, 0x3, {0x0, 0x2710}, {0x1, 0x2, 0x81, 0x7f, 0x7, 0x81, "fa112712"}, 0x5, 0x2, @offset=0x959, 0x591a3b6a, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000240)={r3, 0x0, r6}) 04:28:17 executing program 2 (fault-call:1 fault-nth:1): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4c, 0x0) [ 261.848730][T10409] FAULT_INJECTION: forcing a failure. [ 261.848730][T10409] name failslab, interval 1, probability 0, space 0, times 0 [ 261.889940][T10409] CPU: 0 PID: 10409 Comm: syz-executor.0 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 261.899868][T10409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.909918][T10409] Call Trace: [ 261.913212][T10409] dump_stack+0x188/0x20d [ 261.917547][T10409] should_fail.cold+0x5/0x14 [ 261.922133][T10409] ? setup_fault_attr+0x1e0/0x1e0 [ 261.927190][T10409] should_failslab+0x5/0xf [ 261.931607][T10409] __kmalloc+0x2d9/0x7a0 [ 261.935858][T10409] ? tomoyo_encode2.part.0+0xec/0x3b0 [ 261.941228][T10409] ? d_absolute_path+0x10c/0x160 [ 261.946182][T10409] ? __d_path+0x140/0x140 [ 261.950517][T10409] tomoyo_encode2.part.0+0xec/0x3b0 [ 261.955722][T10409] tomoyo_encode+0x28/0x50 [ 261.960144][T10409] tomoyo_realpath_from_path+0x184/0x620 [ 261.965789][T10409] tomoyo_path_number_perm+0x1c2/0x4d0 [ 261.971236][T10409] ? tomoyo_path_number_perm+0x17a/0x4d0 [ 261.977005][T10409] ? tomoyo_execute_permission+0x470/0x470 [ 261.982918][T10409] ? hlock_class+0x120/0x120 [ 261.987501][T10409] ? hlock_class+0x120/0x120 [ 261.992084][T10409] ? perf_trace_lock+0xeb/0x4c0 [ 261.996942][T10409] ? __fget_files+0x307/0x4f0 [ 262.001651][T10409] ? __fget_files+0x329/0x4f0 [ 262.006336][T10409] ? do_dup2+0x520/0x520 [ 262.010607][T10409] ? __sb_end_write+0x101/0x1d0 [ 262.015448][T10409] ? vfs_write+0x15b/0x5c0 [ 262.019869][T10409] security_file_ioctl+0x6c/0xb0 [ 262.024804][T10409] ksys_ioctl+0x50/0x180 [ 262.029165][T10409] __x64_sys_ioctl+0x6f/0xb0 [ 262.033771][T10409] ? lockdep_hardirqs_on+0x417/0x5d0 [ 262.039079][T10409] do_syscall_64+0xf6/0x790 [ 262.043608][T10409] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.049501][T10409] RIP: 0033:0x45c849 [ 262.053405][T10409] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 262.073020][T10409] RSP: 002b:00007f9301dc7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 262.081440][T10409] RAX: ffffffffffffffda RBX: 00007f9301dc86d4 RCX: 000000000045c849 [ 262.089401][T10409] RDX: 0000000000000000 RSI: 0000000000004b4c RDI: 0000000000000003 [ 262.097359][T10409] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 262.105318][T10409] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 262.113277][T10409] R13: 000000000000056e R14: 00000000004c7ff7 R15: 0000000000000001 [ 262.126917][T10414] FAULT_INJECTION: forcing a failure. [ 262.126917][T10414] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 262.140144][T10414] CPU: 1 PID: 10414 Comm: syz-executor.2 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 262.150147][T10414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.160213][T10414] Call Trace: [ 262.163523][T10414] dump_stack+0x188/0x20d [ 262.167885][T10414] should_fail.cold+0x5/0x14 [ 262.172506][T10414] ? setup_fault_attr+0x1e0/0x1e0 [ 262.177611][T10414] ? text_poke_sync+0x20/0x20 [ 262.182363][T10414] ? trace_hardirqs_off_caller+0x55/0x230 [ 262.188205][T10414] __alloc_pages_nodemask+0x17a/0x820 [ 262.193592][T10414] ? poke_int3_handler+0x214/0x4e0 [ 262.198726][T10414] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 262.204462][T10414] ? mark_lock+0xbc/0x1220 [ 262.208911][T10414] ? __lock_acquire+0x827/0x5270 [ 262.213880][T10414] cache_grow_begin+0x8c/0xc10 [ 262.218660][T10414] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 262.224140][T10414] __kmalloc+0x6d6/0x7a0 [ 262.228400][T10414] ? tomoyo_realpath_from_path+0xc2/0x620 [ 262.234141][T10414] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 262.239719][T10414] tomoyo_realpath_from_path+0xc2/0x620 [ 262.245277][T10414] ? tomoyo_path_number_perm+0x17a/0x4d0 [ 262.250942][T10414] tomoyo_path_number_perm+0x1c2/0x4d0 [ 262.256413][T10414] ? tomoyo_path_number_perm+0x17a/0x4d0 [ 262.262058][T10414] ? __fget_files+0x307/0x4f0 [ 262.266751][T10414] ? tomoyo_execute_permission+0x470/0x470 [ 262.272600][T10414] ? __fget_files+0x307/0x4f0 [ 262.277352][T10414] ? __fget_files+0x329/0x4f0 [ 262.282062][T10414] ? do_dup2+0x520/0x520 [ 262.286316][T10414] ? __sb_end_write+0x101/0x1d0 04:28:17 executing program 5 (fault-call:1 fault-nth:0): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4c, &(0x7f0000000000)) 04:28:17 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x540e, &(0x7f0000000000)) [ 262.291186][T10414] ? vfs_write+0x15b/0x5c0 [ 262.295632][T10414] security_file_ioctl+0x6c/0xb0 [ 262.300597][T10414] ksys_ioctl+0x50/0x180 [ 262.304869][T10414] __x64_sys_ioctl+0x6f/0xb0 [ 262.309475][T10414] ? lockdep_hardirqs_on+0x417/0x5d0 [ 262.314779][T10414] do_syscall_64+0xf6/0x790 [ 262.319306][T10414] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.325203][T10414] RIP: 0033:0x45c849 [ 262.329106][T10414] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 262.348728][T10414] RSP: 002b:00007f3b2dc61c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 262.355794][T10420] FAULT_INJECTION: forcing a failure. [ 262.355794][T10420] name failslab, interval 1, probability 0, space 0, times 0 [ 262.357146][T10414] RAX: ffffffffffffffda RBX: 00007f3b2dc626d4 RCX: 000000000045c849 [ 262.357156][T10414] RDX: 0000000000000000 RSI: 0000000000004b4c RDI: 0000000000000003 04:28:17 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x540f, &(0x7f0000000000)) [ 262.357166][T10414] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 262.357174][T10414] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 262.357188][T10414] R13: 000000000000056e R14: 00000000004c7ff7 R15: 0000000000000001 [ 262.444907][T10420] CPU: 0 PID: 10420 Comm: syz-executor.5 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 262.454840][T10420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.464904][T10420] Call Trace: [ 262.468212][T10420] dump_stack+0x188/0x20d [ 262.472553][T10420] should_fail.cold+0x5/0x14 [ 262.477155][T10420] ? setup_fault_attr+0x1e0/0x1e0 [ 262.482222][T10420] should_failslab+0x5/0xf [ 262.486651][T10420] __kmalloc+0x2d9/0x7a0 [ 262.490902][T10420] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 262.496892][T10420] ? tomoyo_realpath_from_path+0xc2/0x620 [ 262.502651][T10420] ? poke_int3_handler+0x214/0x4e0 [ 262.507770][T10420] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 262.513333][T10420] tomoyo_realpath_from_path+0xc2/0x620 [ 262.518893][T10420] ? tomoyo_path_number_perm+0x17a/0x4d0 [ 262.524560][T10420] tomoyo_path_number_perm+0x1c2/0x4d0 [ 262.530030][T10420] ? tomoyo_path_number_perm+0x17a/0x4d0 [ 262.535668][T10420] ? __fget_files+0x307/0x4f0 [ 262.540351][T10420] ? tomoyo_execute_permission+0x470/0x470 [ 262.546172][T10420] ? __fget_files+0x307/0x4f0 [ 262.550883][T10420] ? __fget_files+0x329/0x4f0 [ 262.555574][T10420] ? do_dup2+0x520/0x520 [ 262.559846][T10420] ? __sb_end_write+0x101/0x1d0 [ 262.564701][T10420] ? vfs_write+0x15b/0x5c0 [ 262.569128][T10420] security_file_ioctl+0x6c/0xb0 [ 262.574080][T10420] ksys_ioctl+0x50/0x180 [ 262.578334][T10420] __x64_sys_ioctl+0x6f/0xb0 [ 262.583192][T10420] ? lockdep_hardirqs_on+0x417/0x5d0 [ 262.588486][T10420] do_syscall_64+0xf6/0x790 [ 262.592998][T10420] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.598889][T10420] RIP: 0033:0x45c849 [ 262.602787][T10420] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 262.622505][T10420] RSP: 002b:00007f415d446c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 262.630916][T10420] RAX: ffffffffffffffda RBX: 00007f415d4476d4 RCX: 000000000045c849 04:28:17 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000), 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:17 executing program 2 (fault-call:1 fault-nth:2): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4c, 0x0) 04:28:17 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5410, &(0x7f0000000000)) [ 262.638897][T10420] RDX: 0000000020000000 RSI: 0000000000004b4c RDI: 0000000000000003 [ 262.646914][T10420] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 262.654900][T10420] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 262.662887][T10420] R13: 000000000000056e R14: 00000000004c7ff7 R15: 0000000000000000 [ 262.683448][T10420] ERROR: Out of memory at tomoyo_realpath_from_path. [ 262.745179][T10430] FAULT_INJECTION: forcing a failure. [ 262.745179][T10430] name failslab, interval 1, probability 0, space 0, times 0 [ 262.764951][T10430] CPU: 0 PID: 10430 Comm: syz-executor.2 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 262.774881][T10430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.784943][T10430] Call Trace: [ 262.788252][T10430] dump_stack+0x188/0x20d [ 262.792604][T10430] should_fail.cold+0x5/0x14 [ 262.797212][T10430] ? setup_fault_attr+0x1e0/0x1e0 [ 262.802263][T10430] should_failslab+0x5/0xf [ 262.806689][T10430] __kmalloc+0x2d9/0x7a0 [ 262.810945][T10430] ? tomoyo_encode2.part.0+0xec/0x3b0 [ 262.816328][T10430] ? d_absolute_path+0x10c/0x160 [ 262.821271][T10430] ? __d_path+0x140/0x140 [ 262.825614][T10430] tomoyo_encode2.part.0+0xec/0x3b0 [ 262.830827][T10430] tomoyo_encode+0x28/0x50 [ 262.835254][T10430] tomoyo_realpath_from_path+0x184/0x620 [ 262.840915][T10430] tomoyo_path_number_perm+0x1c2/0x4d0 [ 262.846381][T10430] ? tomoyo_path_number_perm+0x17a/0x4d0 [ 262.852032][T10430] ? tomoyo_execute_permission+0x470/0x470 [ 262.857877][T10430] ? get_pid_task+0x116/0x200 [ 262.862581][T10430] ? __fget_files+0x307/0x4f0 [ 262.867300][T10430] ? __fget_files+0x329/0x4f0 [ 262.871992][T10430] ? do_dup2+0x520/0x520 [ 262.876241][T10430] ? __sb_end_write+0x101/0x1d0 [ 262.881101][T10430] ? vfs_write+0x15b/0x5c0 [ 262.885537][T10430] security_file_ioctl+0x6c/0xb0 [ 262.890491][T10430] ksys_ioctl+0x50/0x180 [ 262.894751][T10430] __x64_sys_ioctl+0x6f/0xb0 [ 262.899349][T10430] ? lockdep_hardirqs_on+0x417/0x5d0 [ 262.904649][T10430] do_syscall_64+0xf6/0x790 [ 262.909174][T10430] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.915069][T10430] RIP: 0033:0x45c849 [ 262.918977][T10430] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 262.938590][T10430] RSP: 002b:00007f3b2dc61c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 262.947010][T10430] RAX: ffffffffffffffda RBX: 00007f3b2dc626d4 RCX: 000000000045c849 [ 262.955015][T10430] RDX: 0000000000000000 RSI: 0000000000004b4c RDI: 0000000000000003 [ 262.963061][T10430] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 262.971047][T10430] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 262.979023][T10430] R13: 000000000000056e R14: 00000000004c7ff7 R15: 0000000000000002 04:28:18 executing program 0 (fault-call:1 fault-nth:2): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4c, 0x0) 04:28:18 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:18 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f0000000000)) 04:28:18 executing program 5 (fault-call:1 fault-nth:1): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4c, &(0x7f0000000000)) 04:28:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 04:28:18 executing program 2 (fault-call:1 fault-nth:3): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4c, 0x0) [ 262.995032][T10430] ERROR: Out of memory at tomoyo_realpath_from_path. [ 263.003431][T10409] ERROR: Out of memory at tomoyo_realpath_from_path. [ 263.101940][T10448] FAULT_INJECTION: forcing a failure. [ 263.101940][T10448] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 263.115171][T10448] CPU: 1 PID: 10448 Comm: syz-executor.5 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 263.125065][T10448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.135124][T10448] Call Trace: [ 263.138454][T10448] dump_stack+0x188/0x20d [ 263.142798][T10448] should_fail.cold+0x5/0x14 [ 263.147391][T10448] ? setup_fault_attr+0x1e0/0x1e0 [ 263.152500][T10448] ? is_bpf_image_address+0x1cb/0x280 [ 263.157888][T10448] __alloc_pages_nodemask+0x17a/0x820 [ 263.163273][T10448] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 263.168994][T10448] ? mark_lock+0xbc/0x1220 [ 263.173443][T10448] ? __lock_acquire+0x827/0x5270 [ 263.178395][T10448] cache_grow_begin+0x8c/0xc10 [ 263.183170][T10448] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 263.188652][T10448] __kmalloc+0x6d6/0x7a0 [ 263.192887][T10448] ? tomoyo_realpath_from_path+0xc2/0x620 [ 263.198615][T10448] ? _kstrtoull+0x13f/0x1f0 [ 263.203123][T10448] tomoyo_realpath_from_path+0xc2/0x620 [ 263.208661][T10448] ? tomoyo_path_number_perm+0x17a/0x4d0 [ 263.214325][T10448] tomoyo_path_number_perm+0x1c2/0x4d0 [ 263.219816][T10448] ? tomoyo_path_number_perm+0x17a/0x4d0 [ 263.225575][T10448] ? tomoyo_execute_permission+0x470/0x470 [ 263.231409][T10448] ? get_pid_task+0x116/0x200 [ 263.236104][T10448] ? __fget_files+0x307/0x4f0 [ 263.240821][T10448] ? __fget_files+0x329/0x4f0 [ 263.245507][T10448] ? do_dup2+0x520/0x520 [ 263.249741][T10448] ? __sb_end_write+0x101/0x1d0 [ 263.254601][T10448] ? vfs_write+0x15b/0x5c0 [ 263.259030][T10448] security_file_ioctl+0x6c/0xb0 [ 263.263971][T10448] ksys_ioctl+0x50/0x180 [ 263.268211][T10448] __x64_sys_ioctl+0x6f/0xb0 [ 263.272803][T10448] ? lockdep_hardirqs_on+0x417/0x5d0 [ 263.278081][T10448] do_syscall_64+0xf6/0x790 [ 263.282583][T10448] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 263.288475][T10448] RIP: 0033:0x45c849 [ 263.292362][T10448] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 263.311971][T10448] RSP: 002b:00007f415d446c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 263.320387][T10448] RAX: ffffffffffffffda RBX: 00007f415d4476d4 RCX: 000000000045c849 [ 263.328347][T10448] RDX: 0000000020000000 RSI: 0000000000004b4c RDI: 0000000000000003 [ 263.336323][T10448] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 263.344297][T10448] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 263.352259][T10448] R13: 000000000000056e R14: 00000000004c7ff7 R15: 0000000000000001 04:28:18 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5413, &(0x7f0000000000)) 04:28:18 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4c, 0x0) [ 263.393847][T10451] FAULT_INJECTION: forcing a failure. [ 263.393847][T10451] name failslab, interval 1, probability 0, space 0, times 0 [ 263.451244][T10451] CPU: 1 PID: 10451 Comm: syz-executor.0 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 263.461181][T10451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.471249][T10451] Call Trace: [ 263.474552][T10451] dump_stack+0x188/0x20d [ 263.478926][T10451] should_fail.cold+0x5/0x14 [ 263.483549][T10451] ? setup_fault_attr+0x1e0/0x1e0 [ 263.488657][T10451] should_failslab+0x5/0xf [ 263.493267][T10451] __kmalloc+0x2d9/0x7a0 [ 263.497527][T10451] ? tomoyo_encode2.part.0+0xec/0x3b0 [ 263.502915][T10451] ? d_absolute_path+0x10c/0x160 [ 263.507887][T10451] ? __d_path+0x140/0x140 [ 263.512254][T10451] tomoyo_encode2.part.0+0xec/0x3b0 [ 263.517490][T10451] tomoyo_encode+0x28/0x50 [ 263.521928][T10451] tomoyo_realpath_from_path+0x184/0x620 [ 263.527618][T10451] tomoyo_path_number_perm+0x1c2/0x4d0 [ 263.533090][T10451] ? tomoyo_path_number_perm+0x17a/0x4d0 [ 263.538740][T10451] ? tomoyo_execute_permission+0x470/0x470 [ 263.544552][T10451] ? hlock_class+0x120/0x120 04:28:18 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x2, 0x0) [ 263.549192][T10451] ? __fget_files+0x307/0x4f0 [ 263.553943][T10451] ? __fget_files+0x329/0x4f0 [ 263.558644][T10451] ? do_dup2+0x520/0x520 [ 263.562895][T10451] ? __sb_end_write+0x101/0x1d0 [ 263.567761][T10451] ? vfs_write+0x15b/0x5c0 [ 263.572216][T10451] security_file_ioctl+0x6c/0xb0 [ 263.577269][T10451] ksys_ioctl+0x50/0x180 [ 263.581538][T10451] __x64_sys_ioctl+0x6f/0xb0 [ 263.586144][T10451] ? lockdep_hardirqs_on+0x417/0x5d0 [ 263.591535][T10451] do_syscall_64+0xf6/0x790 [ 263.596042][T10451] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 263.601942][T10451] RIP: 0033:0x45c849 [ 263.605853][T10451] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 263.625459][T10451] RSP: 002b:00007f9301dc7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 263.633861][T10451] RAX: ffffffffffffffda RBX: 00007f9301dc86d4 RCX: 000000000045c849 [ 263.641823][T10451] RDX: 0000000000000000 RSI: 0000000000004b4c RDI: 0000000000000003 04:28:18 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) [ 263.649902][T10451] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 263.657881][T10451] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 263.665859][T10451] R13: 000000000000056e R14: 00000000004c7ff7 R15: 0000000000000002 04:28:18 executing program 5 (fault-call:1 fault-nth:2): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4c, &(0x7f0000000000)) 04:28:18 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5414, &(0x7f0000000000)) [ 263.762289][T10451] ERROR: Out of memory at tomoyo_realpath_from_path. 04:28:19 executing program 0 (fault-call:1 fault-nth:3): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4c, 0x0) 04:28:19 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x10, 0x0) 04:28:19 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) [ 263.878120][T10468] FAULT_INJECTION: forcing a failure. [ 263.878120][T10468] name failslab, interval 1, probability 0, space 0, times 0 04:28:19 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b2f, 0x0) 04:28:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 04:28:19 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4c, 0x0) 04:28:19 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, 0x0, 0x0) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:19 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b30, 0x0) 04:28:19 executing program 5 (fault-call:1 fault-nth:3): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4c, &(0x7f0000000000)) 04:28:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 04:28:19 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x2, 0x0) [ 264.139451][T10468] CPU: 0 PID: 10468 Comm: syz-executor.5 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 264.139461][T10468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.139468][T10468] Call Trace: [ 264.139500][T10468] dump_stack+0x188/0x20d [ 264.139526][T10468] should_fail.cold+0x5/0x14 [ 264.139546][T10468] ? setup_fault_attr+0x1e0/0x1e0 [ 264.139579][T10468] should_failslab+0x5/0xf [ 264.139594][T10468] __kmalloc+0x2d9/0x7a0 [ 264.139609][T10468] ? tomoyo_encode2.part.0+0xec/0x3b0 [ 264.139625][T10468] ? d_absolute_path+0x10c/0x160 [ 264.139639][T10468] ? __d_path+0x140/0x140 [ 264.139662][T10468] tomoyo_encode2.part.0+0xec/0x3b0 [ 264.139683][T10468] tomoyo_encode+0x28/0x50 [ 264.139699][T10468] tomoyo_realpath_from_path+0x184/0x620 [ 264.139732][T10468] tomoyo_path_number_perm+0x1c2/0x4d0 [ 264.139753][T10468] ? tomoyo_path_number_perm+0x17a/0x4d0 [ 264.139776][T10468] ? tomoyo_execute_permission+0x470/0x470 [ 264.139789][T10468] ? hlock_class+0x120/0x120 [ 264.139800][T10468] ? hlock_class+0x120/0x120 [ 264.139814][T10468] ? perf_trace_lock+0xeb/0x4c0 [ 264.139842][T10468] ? __fget_files+0x307/0x4f0 [ 264.139889][T10468] ? __fget_files+0x329/0x4f0 [ 264.139912][T10468] ? do_dup2+0x520/0x520 [ 264.139927][T10468] ? __sb_end_write+0x101/0x1d0 [ 264.139941][T10468] ? vfs_write+0x15b/0x5c0 [ 264.139966][T10468] security_file_ioctl+0x6c/0xb0 [ 264.139985][T10468] ksys_ioctl+0x50/0x180 [ 264.140004][T10468] __x64_sys_ioctl+0x6f/0xb0 [ 264.140018][T10468] ? lockdep_hardirqs_on+0x417/0x5d0 [ 264.140036][T10468] do_syscall_64+0xf6/0x790 [ 264.140057][T10468] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.140068][T10468] RIP: 0033:0x45c849 [ 264.140085][T10468] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 264.140093][T10468] RSP: 002b:00007f415d446c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 264.140106][T10468] RAX: ffffffffffffffda RBX: 00007f415d4476d4 RCX: 000000000045c849 [ 264.140114][T10468] RDX: 0000000020000000 RSI: 0000000000004b4c RDI: 0000000000000003 [ 264.140122][T10468] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 264.140129][T10468] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 264.140137][T10468] R13: 000000000000056e R14: 00000000004c7ff7 R15: 0000000000000002 04:28:19 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5415, &(0x7f0000000000)) 04:28:19 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b31, 0x0) 04:28:19 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, 0x0, 0x0) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:19 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x10, 0x0) 04:28:19 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4c, &(0x7f0000000000)) 04:28:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) [ 264.140315][T10468] ERROR: Out of memory at tomoyo_realpath_from_path. 04:28:20 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b32, 0x0) 04:28:20 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b2f, 0x0) 04:28:20 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x2, &(0x7f0000000000)) 04:28:20 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, 0x0, 0x0) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 04:28:20 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5416, &(0x7f0000000000)) 04:28:20 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b30, 0x0) 04:28:20 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b33, 0x0) 04:28:20 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x10, &(0x7f0000000000)) 04:28:20 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:20 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5418, &(0x7f0000000000)) 04:28:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 04:28:20 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b2f, &(0x7f0000000000)) 04:28:20 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b31, 0x0) 04:28:20 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b34, 0x0) 04:28:20 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:20 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541b, &(0x7f0000000000)) 04:28:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 04:28:20 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b30, &(0x7f0000000000)) 04:28:20 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b35, 0x0) 04:28:20 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b32, 0x0) 04:28:20 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541d, &(0x7f0000000000)) 04:28:20 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x0, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) 04:28:20 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b36, 0x0) 04:28:20 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b31, &(0x7f0000000000)) 04:28:20 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b33, 0x0) 04:28:21 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541e, &(0x7f0000000000)) 04:28:21 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b37, 0x0) 04:28:21 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b32, &(0x7f0000000000)) 04:28:21 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:21 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b34, 0x0) 04:28:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x0, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) 04:28:21 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541e, &(0x7f0000000000)) 04:28:21 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b3a, 0x0) 04:28:21 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b35, 0x0) 04:28:21 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b33, &(0x7f0000000000)) 04:28:21 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5421, &(0x7f0000000000)) 04:28:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x0, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) 04:28:21 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b36, 0x0) 04:28:21 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b3b, 0x0) 04:28:21 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b34, &(0x7f0000000000)) 04:28:21 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:21 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5422, &(0x7f0000000000)) 04:28:21 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b35, &(0x7f0000000000)) 04:28:21 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b37, 0x0) 04:28:21 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b3c, 0x0) 04:28:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x1c, 0x1a, 0x1}, 0x1c}}, 0x0) 04:28:22 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b3d, 0x0) 04:28:22 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b3a, 0x0) 04:28:22 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b36, &(0x7f0000000000)) 04:28:22 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5423, &(0x7f0000000000)) 04:28:22 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b40, 0x0) 04:28:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x1c, 0x1a, 0x1}, 0x1c}}, 0x0) [ 267.050894][T10685] sp0: Synchronizing with TNC 04:28:22 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:22 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b3b, 0x0) 04:28:22 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b37, &(0x7f0000000000)) 04:28:22 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5424, &(0x7f0000000000)) 04:28:22 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b41, 0x0) 04:28:22 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b40, 0x0) 04:28:22 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b44, 0x0) 04:28:22 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b40, 0x0) 04:28:22 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b3a, &(0x7f0000000000)) 04:28:22 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b3c, 0x0) 04:28:22 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5425, &(0x7f0000000000)) 04:28:22 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b45, 0x0) 04:28:23 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x0, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:23 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b40, 0x0) 04:28:23 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b3b, &(0x7f0000000000)) 04:28:23 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b46, 0x0) 04:28:23 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b3d, 0x0) 04:28:23 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5427, &(0x7f0000000000)) 04:28:23 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b47, 0x0) 04:28:23 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b3c, &(0x7f0000000000)) 04:28:23 executing program 3: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b40, 0x0) 04:28:23 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5428, &(0x7f0000000000)) 04:28:23 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b40, 0x0) 04:28:23 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b48, 0x0) 04:28:24 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x0, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:24 executing program 3: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b40, 0x0) 04:28:24 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b3d, &(0x7f0000000000)) 04:28:24 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5429, &(0x7f0000000000)) 04:28:24 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b41, 0x0) 04:28:24 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b49, 0x0) 04:28:24 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4a, 0x0) 04:28:24 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b44, 0x0) 04:28:24 executing program 3: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b40, 0x0) 04:28:24 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5437, &(0x7f0000000000)) 04:28:24 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b40, &(0x7f0000000000)) 04:28:24 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4b, 0x0) 04:28:24 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x0, &(0x7f0000001180)=""/4125, &(0x7f0000001140)=0x101d) 04:28:24 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b45, 0x0) 04:28:24 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b40, 0x0) 04:28:24 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b41, &(0x7f0000000000)) 04:28:24 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5441, &(0x7f0000000000)) 04:28:24 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4d, 0x0) 04:28:24 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b40, 0x0) 04:28:24 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b46, 0x0) 04:28:24 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b44, &(0x7f0000000000)) 04:28:25 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5450, &(0x7f0000000000)) 04:28:25 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b40, 0x0) 04:28:25 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4e, 0x0) 04:28:25 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x14, 0x0, &(0x7f0000001140)) 04:28:25 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b47, 0x0) 04:28:25 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b40, 0x0) 04:28:25 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5451, &(0x7f0000000000)) 04:28:25 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b45, &(0x7f0000000000)) 04:28:25 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b52, 0x0) 04:28:25 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b60, 0x0) 04:28:25 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5437, &(0x7f0000000000)) 04:28:25 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5452, &(0x7f0000000000)) 04:28:25 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b46, &(0x7f0000000000)) 04:28:25 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b48, 0x0) 04:28:25 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b61, 0x0) 04:28:25 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x14, 0x0, &(0x7f0000001140)) 04:28:25 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4a, 0x0) 04:28:25 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b49, 0x0) 04:28:25 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b47, &(0x7f0000000000)) 04:28:25 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b62, 0x0) 04:28:25 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x545d, &(0x7f0000000000)) 04:28:26 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4a, 0x0) 04:28:26 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b63, 0x0) 04:28:26 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4a, 0x0) 04:28:26 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5460, &(0x7f0000000000)) 04:28:26 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b48, &(0x7f0000000000)) 04:28:26 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b64, 0x0) 04:28:26 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x14, 0x0, &(0x7f0000001140)) 04:28:26 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4b, 0x0) 04:28:26 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b49, &(0x7f0000000000)) 04:28:26 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5600, &(0x7f0000000000)) 04:28:26 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4a, 0x0) 04:28:26 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b65, 0x0) 04:28:26 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4d, 0x0) 04:28:26 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b66, 0x0) 04:28:26 executing program 3: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b4a, 0x0) 04:28:26 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5601, &(0x7f0000000000)) 04:28:26 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4a, &(0x7f0000000000)) 04:28:26 executing program 3: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b4a, 0x0) 04:28:27 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, 0x0) 04:28:27 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4e, 0x0) 04:28:27 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5602, &(0x7f0000000000)) 04:28:27 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4b, &(0x7f0000000000)) 04:28:27 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b67, 0x0) 04:28:27 executing program 3: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b4a, 0x0) 04:28:27 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b68, 0x0) 04:28:27 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4a, 0x0) 04:28:27 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4d, &(0x7f0000000000)) 04:28:27 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5603, &(0x7f0000000000)) 04:28:27 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b52, 0x0) 04:28:27 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b69, 0x0) 04:28:27 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, 0x0) 04:28:27 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4a, 0x0) 04:28:27 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5605, &(0x7f0000000000)) 04:28:27 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4e, &(0x7f0000000000)) 04:28:27 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b60, 0x0) 04:28:27 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b6a, 0x0) 04:28:27 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4a, 0x0) 04:28:27 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b61, 0x0) 04:28:27 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b6b, 0x0) 04:28:27 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5606, &(0x7f0000000000)) 04:28:27 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b52, &(0x7f0000000000)) 04:28:27 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b4a, 0x0) 04:28:28 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000001180)=""/4125, 0x0) 04:28:28 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b6c, 0x0) 04:28:28 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b62, 0x0) 04:28:28 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5607, &(0x7f0000000000)) 04:28:28 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b60, &(0x7f0000000000)) 04:28:28 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b4a, 0x0) 04:28:28 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b6d, 0x0) 04:28:28 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b63, 0x0) 04:28:28 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5608, &(0x7f0000000000)) 04:28:28 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b61, &(0x7f0000000000)) 04:28:28 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b4a, 0x0) 04:28:28 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b70, 0x0) 04:28:28 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b71, 0x0) 04:28:28 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b64, 0x0) 04:28:28 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5609, &(0x7f0000000000)) 04:28:28 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b62, &(0x7f0000000000)) 04:28:28 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b61, &(0x7f0000000000)) 04:28:28 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5607, &(0x7f0000000000)) 04:28:28 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b72, 0x0) 04:28:28 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b65, 0x0) 04:28:28 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x560a, &(0x7f0000000000)) 04:28:28 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b63, &(0x7f0000000000)) 04:28:28 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b61, &(0x7f0000000000)) 04:28:29 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5607, &(0x7f0000000000)) 04:28:29 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b66, 0x0) 04:28:29 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x560b, &(0x7f0000000000)) 04:28:29 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b64, &(0x7f0000000000)) 04:28:29 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4bfa, 0x0) 04:28:29 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b61, &(0x7f0000000000)) 04:28:29 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b67, 0x0) 04:28:29 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x560c, &(0x7f0000000000)) 04:28:29 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5607, &(0x7f0000000000)) 04:28:29 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b65, &(0x7f0000000000)) 04:28:29 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4bfb, 0x0) 04:28:29 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b68, 0x0) 04:28:29 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x560d, &(0x7f0000000000)) 04:28:29 executing program 3: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b61, &(0x7f0000000000)) 04:28:29 executing program 4: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5607, &(0x7f0000000000)) 04:28:29 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4c01, 0x0) 04:28:29 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b66, &(0x7f0000000000)) 04:28:29 executing program 3: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b61, &(0x7f0000000000)) 04:28:29 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b69, 0x0) 04:28:29 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x560e, &(0x7f0000000000)) 04:28:29 executing program 4: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5607, &(0x7f0000000000)) 04:28:29 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b67, &(0x7f0000000000)) 04:28:29 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5409, 0x0) 04:28:29 executing program 3: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b61, &(0x7f0000000000)) 04:28:29 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b6a, 0x0) 04:28:30 executing program 4: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5607, &(0x7f0000000000)) 04:28:30 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x540b, 0x0) 04:28:30 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b61, &(0x7f0000000000)) 04:28:30 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b6b, 0x0) 04:28:30 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b68, &(0x7f0000000000)) 04:28:30 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5607, &(0x7f0000000000)) 04:28:30 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x560f, &(0x7f0000000000)) 04:28:30 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x540c, 0x0) 04:28:30 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b61, &(0x7f0000000000)) 04:28:30 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b69, &(0x7f0000000000)) 04:28:30 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5607, &(0x7f0000000000)) 04:28:30 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b6c, 0x0) 04:28:30 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b61, &(0x7f0000000000)) 04:28:30 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b6d, 0x0) 04:28:30 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x540d, 0x0) 04:28:30 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5607, &(0x7f0000000000)) 04:28:30 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b6a, &(0x7f0000000000)) 04:28:31 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b61, &(0x7f0000000000)) 04:28:31 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x6364, &(0x7f0000000000)) 04:28:31 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x540e, 0x0) 04:28:31 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b70, 0x0) 04:28:31 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5607, &(0x7f0000000000)) 04:28:31 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b61, 0x0) 04:28:31 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x8933, &(0x7f0000000000)) 04:28:31 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x540f, 0x0) 04:28:31 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b6b, &(0x7f0000000000)) 04:28:31 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b71, 0x0) 04:28:31 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b61, 0x0) 04:28:31 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5607, 0x0) 04:28:31 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x400454ca, &(0x7f0000000000)) 04:28:31 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5410, 0x0) 04:28:31 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b72, 0x0) 04:28:31 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b6c, &(0x7f0000000000)) 04:28:31 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b61, 0x0) 04:28:31 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, 0x0) 04:28:31 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x40049409, &(0x7f0000000000)) 04:28:31 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x560f, &(0x7f0000000000)) 04:28:31 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4bfa, 0x0) 04:28:31 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b6d, &(0x7f0000000000)) 04:28:31 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x560e, &(0x7f0000000000)) 04:28:31 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5413, 0x0) 04:28:31 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x40186366, &(0x7f0000000000)) 04:28:32 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x560f, &(0x7f0000000000)) 04:28:32 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4bfb, 0x0) 04:28:32 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b70, &(0x7f0000000000)) 04:28:32 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5414, 0x0) 04:28:32 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4020940d, &(0x7f0000000000)) 04:28:32 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4c01, 0x0) 04:28:32 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x560f, &(0x7f0000000000)) 04:28:32 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5415, 0x0) 04:28:32 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b71, &(0x7f0000000000)) 04:28:32 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5414, 0x0) 04:28:32 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x80045432, &(0x7f0000000000)) 04:28:32 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5409, 0x0) 04:28:32 executing program 4: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x560f, &(0x7f0000000000)) 04:28:32 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5416, 0x0) 04:28:32 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b72, &(0x7f0000000000)) 04:28:32 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5418, 0x0) 04:28:32 executing program 4: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x560f, &(0x7f0000000000)) 04:28:32 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4bfa, &(0x7f0000000000)) 04:28:32 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x540b, 0x0) 04:28:33 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x80045440, &(0x7f0000000000)) 04:28:33 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5414, 0x0) 04:28:33 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541b, 0x0) 04:28:33 executing program 4: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x560f, &(0x7f0000000000)) 04:28:33 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x80086301, &(0x7f0000000000)) 04:28:33 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x540c, 0x0) 04:28:33 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4bfb, &(0x7f0000000000)) 04:28:33 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, 0x0) 04:28:33 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5414, 0x0) 04:28:33 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x540d, 0x0) 04:28:33 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x560f, &(0x7f0000000000)) 04:28:33 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0xc0045878, &(0x7f0000000000)) 04:28:33 executing program 3: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5414, 0x0) 04:28:33 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4c01, &(0x7f0000000000)) 04:28:33 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541d, 0x0) 04:28:33 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x560f, &(0x7f0000000000)) 04:28:33 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5409, &(0x7f0000000000)) 04:28:33 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x540e, 0x0) 04:28:33 executing program 3: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5414, 0x0) 04:28:33 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541e, 0x0) 04:28:33 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0xc0045878, &(0x7f0000000000)) 04:28:33 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x540f, 0x0) 04:28:33 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x560f, &(0x7f0000000000)) 04:28:33 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541e, 0x0) 04:28:34 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x540b, &(0x7f0000000000)) 04:28:34 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0xc0189436, &(0x7f0000000000)) 04:28:34 executing program 3: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5414, 0x0) 04:28:34 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x560f, &(0x7f0000000000)) 04:28:34 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5410, 0x0) 04:28:34 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5421, 0x0) 04:28:34 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x540c, &(0x7f0000000000)) 04:28:34 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5414, 0x0) 04:28:34 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0xc020660b, &(0x7f0000000000)) 04:28:34 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, 0x0) 04:28:34 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x560f, 0x0) 04:28:34 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5422, 0x0) 04:28:34 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x540d, &(0x7f0000000000)) 04:28:34 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5414, 0x0) 04:28:34 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x560f, 0x0) 04:28:34 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5413, 0x0) 04:28:34 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)=0x2) 04:28:34 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5423, 0x0) 04:28:34 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x540e, &(0x7f0000000000)) 04:28:34 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5414, 0x0) 04:28:34 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x560f, 0x0) 04:28:34 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5424, 0x0) 04:28:34 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5414, 0x0) 04:28:34 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5414, 0x0) 04:28:34 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)=0x3) 04:28:34 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x540f, &(0x7f0000000000)) 04:28:35 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x560f, &(0x7f0000000000)) [ 279.878037][T11518] [ 279.880410][T11518] ====================================================== [ 279.887424][T11518] WARNING: possible circular locking dependency detected [ 279.894442][T11518] 5.6.0-rc3-next-20200228-syzkaller #0 Not tainted [ 279.900945][T11518] ------------------------------------------------------ [ 279.907966][T11518] syz-executor.1/11518 is trying to acquire lock: [ 279.914367][T11518] ffff888087dd42a0 (&tty->termios_rwsem){++++}, at: n_tty_receive_buf_common+0x87/0x2ac0 [ 279.924265][T11518] [ 279.924265][T11518] but task is already holding lock: [ 279.931636][T11518] ffffffff89f414c0 (sel_lock){+.+.}, at: paste_selection+0x155/0x490 [ 279.939847][T11518] [ 279.939847][T11518] which lock already depends on the new lock. [ 279.939847][T11518] [ 279.950263][T11518] [ 279.950263][T11518] the existing dependency chain (in reverse order) is: [ 279.959290][T11518] [ 279.959290][T11518] -> #2 (sel_lock){+.+.}: [ 279.965798][T11518] __mutex_lock+0x156/0x13c0 [ 279.970906][T11518] set_selection_kernel+0x38a/0x13c0 04:28:35 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5415, 0x0) 04:28:35 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b66, &(0x7f0000000000)) [ 279.976711][T11518] set_selection_user+0x94/0xd7 [ 279.982080][T11518] tioclinux+0x115/0x480 [ 279.986957][T11518] vt_ioctl+0x18a6/0x2450 [ 279.991867][T11518] tty_ioctl+0xedd/0x1440 [ 279.996716][T11518] ksys_ioctl+0x11a/0x180 [ 280.001564][T11518] __x64_sys_ioctl+0x6f/0xb0 [ 280.006680][T11518] do_syscall_64+0xf6/0x790 04:28:35 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5425, 0x0) 04:28:35 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5410, &(0x7f0000000000)) 04:28:35 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5416, 0x0) [ 280.011719][T11518] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.011724][T11518] [ 280.011724][T11518] -> #1 (console_lock){+.+.}: [ 280.011806][T11518] console_lock+0x44/0x80 [ 280.011818][T11518] con_flush_chars+0x35/0x90 [ 280.011828][T11518] n_tty_write+0xd49/0xf90 [ 280.011841][T11518] tty_write+0x48f/0x7f0 04:28:35 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5427, 0x0) 04:28:35 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5418, 0x0) [ 280.011852][T11518] __vfs_write+0x76/0x100 [ 280.011862][T11518] vfs_write+0x262/0x5c0 [ 280.011872][T11518] ksys_write+0x127/0x250 [ 280.011886][T11518] do_syscall_64+0xf6/0x790 04:28:35 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f0000000000)) [ 280.011899][T11518] entry_SYSCALL_64_after_hwframe+0x49/0xbe 04:28:35 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5428, 0x0) [ 280.011902][T11518] [ 280.011902][T11518] -> #0 (&tty->termios_rwsem){++++}: [ 280.011923][T11518] __lock_acquire+0x24b3/0x5270 [ 280.011933][T11518] lock_acquire+0x197/0x420 [ 280.011942][T11518] down_read+0x96/0x430 [ 280.011954][T11518] n_tty_receive_buf_common+0x87/0x2ac0 [ 280.011966][T11518] tty_ldisc_receive_buf+0xa9/0x190 [ 280.011977][T11518] paste_selection+0x1e5/0x490 [ 280.011987][T11518] tioclinux+0x12c/0x480 [ 280.011997][T11518] vt_ioctl+0x18a6/0x2450 [ 280.012008][T11518] tty_ioctl+0xedd/0x1440 [ 280.012018][T11518] ksys_ioctl+0x11a/0x180 [ 280.012029][T11518] __x64_sys_ioctl+0x6f/0xb0 [ 280.012041][T11518] do_syscall_64+0xf6/0x790 [ 280.012054][T11518] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.012057][T11518] [ 280.012057][T11518] other info that might help us debug this: [ 280.012057][T11518] [ 280.012061][T11518] Chain exists of: [ 280.012061][T11518] &tty->termios_rwsem --> console_lock --> sel_lock [ 280.012061][T11518] [ 280.012076][T11518] Possible unsafe locking scenario: [ 280.012076][T11518] [ 280.012079][T11518] CPU0 CPU1 [ 280.012082][T11518] ---- ---- [ 280.012084][T11518] lock(sel_lock); [ 280.012091][T11518] lock(console_lock); [ 280.012098][T11518] lock(sel_lock); [ 280.012103][T11518] lock(&tty->termios_rwsem); [ 280.012110][T11518] [ 280.012110][T11518] *** DEADLOCK *** [ 280.012110][T11518] [ 280.012118][T11518] 3 locks held by syz-executor.1/11518: [ 280.012122][T11518] #0: ffff888087dd4090 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x22/0x80 [ 280.012145][T11518] #1: ffff8880aa1be0a8 (&buf->lock){+.+.}, at: paste_selection+0x122/0x490 [ 280.012166][T11518] #2: ffffffff89f414c0 (sel_lock){+.+.}, at: paste_selection+0x155/0x490 [ 280.012187][T11518] [ 280.012187][T11518] stack backtrace: [ 280.012201][T11518] CPU: 0 PID: 11518 Comm: syz-executor.1 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 280.012207][T11518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.012211][T11518] Call Trace: [ 280.012226][T11518] dump_stack+0x188/0x20d [ 280.012241][T11518] check_noncircular+0x32e/0x3e0 [ 280.012256][T11518] ? print_circular_bug.isra.0+0x220/0x220 [ 280.012271][T11518] ? graph_lock+0x7e/0x210 [ 280.012283][T11518] ? alloc_list_entry+0xb0/0xb0 [ 280.012293][T11518] ? mark_lock+0xbc/0x1220 [ 280.012308][T11518] __lock_acquire+0x24b3/0x5270 [ 280.012328][T11518] ? mark_held_locks+0xe0/0xe0 [ 280.012344][T11518] lock_acquire+0x197/0x420 [ 280.012357][T11518] ? n_tty_receive_buf_common+0x87/0x2ac0 [ 280.012372][T11518] down_read+0x96/0x430 [ 280.012384][T11518] ? n_tty_receive_buf_common+0x87/0x2ac0 [ 280.012396][T11518] ? down_read_killable+0x460/0x460 [ 280.012409][T11518] ? __mutex_lock+0x458/0x13c0 [ 280.012424][T11518] n_tty_receive_buf_common+0x87/0x2ac0 [ 280.012439][T11518] ? paste_selection+0x147/0x490 [ 280.012453][T11518] ? mark_lock+0xbc/0x1220 [ 280.012471][T11518] tty_ldisc_receive_buf+0xa9/0x190 [ 280.012484][T11518] ? n_tty_receive_buf_common+0x2ac0/0x2ac0 [ 280.012505][T11518] paste_selection+0x1e5/0x490 [ 280.012519][T11518] ? sel_pos+0x90/0x90 [ 280.012581][T11518] ? wake_up_q+0x140/0x140 [ 280.012598][T11518] tioclinux+0x12c/0x480 [ 280.012611][T11518] vt_ioctl+0x18a6/0x2450 [ 280.012625][T11518] ? complete_change_console+0x390/0x390 [ 280.012641][T11518] ? tomoyo_path_number_perm+0x238/0x4d0 [ 280.012656][T11518] ? tomoyo_execute_permission+0x470/0x470 [ 280.012667][T11518] ? find_held_lock+0x2d/0x110 [ 280.012729][T11518] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 280.012743][T11518] ? complete_change_console+0x390/0x390 [ 280.012758][T11518] tty_ioctl+0xedd/0x1440 [ 280.012777][T11518] ? tty_vhangup+0x30/0x30 [ 280.012789][T11518] ? do_vfs_ioctl+0x506/0x12c0 [ 280.012802][T11518] ? ioctl_file_clone+0x180/0x180 [ 280.012816][T11518] ? __fget_files+0x329/0x4f0 [ 280.012830][T11518] ? do_dup2+0x520/0x520 [ 280.012861][T11518] ? __x64_sys_futex+0x380/0x4f0 [ 280.012879][T11518] ? tty_vhangup+0x30/0x30 [ 280.012890][T11518] ksys_ioctl+0x11a/0x180 [ 280.012904][T11518] __x64_sys_ioctl+0x6f/0xb0 [ 280.012916][T11518] ? lockdep_hardirqs_on+0x417/0x5d0 [ 280.012930][T11518] do_syscall_64+0xf6/0x790 [ 280.012946][T11518] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.012956][T11518] RIP: 0033:0x45c849 [ 280.012971][T11518] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 280.012977][T11518] RSP: 002b:00007f2c672c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 280.012989][T11518] RAX: ffffffffffffffda RBX: 00007f2c672c86d4 RCX: 000000000045c849 [ 280.012996][T11518] RDX: 0000000020000000 RSI: 000000000000541c RDI: 0000000000000003 04:28:36 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)=0x4) 04:28:36 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541b, 0x0) [ 280.013002][T11518] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 280.013008][T11518] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 280.013015][T11518] R13: 000000000000056e R14: 00000000004c7ff7 R15: 000000000076bf0c 04:28:36 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x560f, &(0x7f0000000000)) 04:28:36 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5429, 0x0) 04:28:36 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b66, &(0x7f0000000000)) 04:28:36 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5413, &(0x7f0000000000)) 04:28:36 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, 0x0) 04:28:36 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)=0x5) 04:28:36 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5414, &(0x7f0000000000)) 04:28:36 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5437, 0x0) 04:28:36 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b66, &(0x7f0000000000)) 04:28:36 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541d, 0x0) 04:28:36 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)=0x6) 04:28:36 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x560f, &(0x7f0000000000)) 04:28:36 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)=0x9) 04:28:36 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5441, 0x0) 04:28:36 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5415, &(0x7f0000000000)) 04:28:36 executing program 3: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b66, &(0x7f0000000000)) 04:28:36 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)=0xa) 04:28:36 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541e, 0x0) 04:28:36 executing program 4: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x560f, &(0x7f0000000000)) 04:28:36 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5450, 0x0) 04:28:36 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5416, &(0x7f0000000000)) 04:28:36 executing program 3: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b66, &(0x7f0000000000)) 04:28:36 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541e, 0x0) 04:28:36 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)=0xb) 04:28:36 executing program 4: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x560f, &(0x7f0000000000)) 04:28:36 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5418, &(0x7f0000000000)) 04:28:36 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5451, 0x0) 04:28:36 executing program 3: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b66, &(0x7f0000000000)) 04:28:36 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5421, 0x0) 04:28:36 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)=0xc) 04:28:36 executing program 4: ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x560f, &(0x7f0000000000)) 04:28:36 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5452, 0x0) 04:28:36 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541b, &(0x7f0000000000)) 04:28:36 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5422, 0x0) 04:28:36 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)=0xd) 04:28:36 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b66, &(0x7f0000000000)) 04:28:37 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x560f, &(0x7f0000000000)) 04:28:37 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x545d, 0x0) 04:28:37 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5423, 0x0) 04:28:37 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) 04:28:37 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b66, &(0x7f0000000000)) 04:28:37 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)=0xe) 04:28:37 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x560f, &(0x7f0000000000)) 04:28:37 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5460, 0x0) 04:28:37 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541d, &(0x7f0000000000)) 04:28:37 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b66, &(0x7f0000000000)) 04:28:37 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)=0xf) 04:28:37 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5424, 0x0) 04:28:37 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x560f, &(0x7f0000000000)) 04:28:37 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5600, 0x0) 04:28:37 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541e, &(0x7f0000000000)) 04:28:37 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)=0x11) 04:28:37 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x4b66, &(0x7f0000000000)) 04:28:37 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5601, 0x0) 04:28:37 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5425, 0x0) 04:28:37 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x560f, &(0x7f0000000000)) 04:28:37 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541e, &(0x7f0000000000)) 04:28:37 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b66, 0x0) 04:28:37 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x1f, 0x100) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x0], 0x1, 0x2}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x541c, &(0x7f0000000000)) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r4, 0x0, r3, 0x0, 0x10000000008, 0x0) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{}]}) syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x10000) getsockopt$IP_SET_OP_GET_FNAME(r2, 0x1, 0x53, &(0x7f0000000140)={0x8, 0x7, 0x0, 'syz1\x00'}, &(0x7f00000001c0)=0x2c) 04:28:37 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5602, 0x0) 04:28:37 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x560f, 0x0) 04:28:37 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5427, 0x0) 04:28:37 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5421, &(0x7f0000000000)) 04:28:37 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b66, 0x0) 04:28:37 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5603, 0x0) 04:28:37 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5428, 0x0) 04:28:37 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x560f, 0x0) 04:28:37 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @rand_addr="100e0e188dec22c679daac3b6f3d26b3"}]}, &(0x7f0000000180)=0x10) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x7c, &(0x7f0000000480)={r3}, 0x14) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000040)={r3, @in6={{0xa, 0x4e20, 0x6d83, @mcast2, 0x9}}}, 0x84) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) 04:28:37 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5422, &(0x7f0000000000)) 04:28:37 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b66, 0x0) 04:28:37 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5429, 0x0) 04:28:38 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x560f, 0x0) 04:28:38 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5605, 0x0) 04:28:38 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @rand_addr="100e0e188dec22c679daac3b6f3d26b3"}]}, &(0x7f0000000180)=0x10) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x7c, &(0x7f0000000480)={r3}, 0x14) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000040)={r3, @in6={{0xa, 0x4e20, 0x6d83, @mcast2, 0x9}}}, 0x84) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) 04:28:38 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @rand_addr="100e0e188dec22c679daac3b6f3d26b3"}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000480)={r2}, 0x14) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000080)={0x5, 0x6, 0x4, 0x400000, 0x6, {}, {0x3, 0xc, 0x9, 0x40, 0xff, 0x7f, "95626e67"}, 0x1000, 0x2, @offset=0x9, 0x4, 0x0, 0xffffffffffffffff}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r6 = dup(0xffffffffffffffff) getpeername$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r7}) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x25dfdbfb, {}, [@RTA_OIF={0x8, 0x4, r7}]}, 0x24}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001540)={'team0\x00', r7}) r9 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(r10, r10) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000001580)={{{@in=@loopback, @in=@multicast1, 0x4e24, 0x0, 0x4e23, 0x0, 0x2, 0x80, 0x180, 0x4, r8, r10}, {0x80, 0x8187, 0x80, 0x4, 0x0, 0x5bbe, 0x30, 0xfff}, {0x2, 0x4, 0x100, 0x461}, 0xffffff7f, 0x6e6bba, 0x0, 0x1, 0x3, 0x59b65a8bb0628042}, {{@in6=@mcast2, 0x4d4, 0xff}, 0xa, @in6=@dev={0xfe, 0x80, [], 0x24}, 0x3504, 0x3, 0x3, 0x5, 0x8000, 0x8001, 0x8848}}, 0xe8) 04:28:38 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5423, &(0x7f0000000000)) 04:28:38 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5437, 0x0) 04:28:38 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x1f, 0x100) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x0], 0x1, 0x2}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x541c, &(0x7f0000000000)) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r4, 0x0, r3, 0x0, 0x10000000008, 0x0) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{}]}) syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x10000) getsockopt$IP_SET_OP_GET_FNAME(r2, 0x1, 0x53, &(0x7f0000000140)={0x8, 0x7, 0x0, 'syz1\x00'}, &(0x7f00000001c0)=0x2c) 04:28:38 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5606, 0x0) 04:28:38 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) 04:28:38 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @rand_addr="100e0e188dec22c679daac3b6f3d26b3"}]}, &(0x7f0000000180)=0x10) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x7c, &(0x7f0000000480)={r3}, 0x14) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000040)={r3, @in6={{0xa, 0x4e20, 0x6d83, @mcast2, 0x9}}}, 0x84) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) [ 283.093443][T11794] sp0: Synchronizing with TNC 04:28:38 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x1f, 0x100) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x0], 0x1, 0x2}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x541c, &(0x7f0000000000)) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r4, 0x0, r3, 0x0, 0x10000000008, 0x0) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{}]}) syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x10000) getsockopt$IP_SET_OP_GET_FNAME(r2, 0x1, 0x53, &(0x7f0000000140)={0x8, 0x7, 0x0, 'syz1\x00'}, &(0x7f00000001c0)=0x2c) 04:28:38 executing program 1: socket$can_j1939(0x1d, 0x2, 0x7) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) r3 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(r4, r4) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)={[{@gid={'gid', 0x3d, r6}}]}) fchown(r1, r4, r6) splice(r2, 0x0, r1, 0x0, 0x10000000008, 0x0) ioctl$TCGETX(r1, 0x5432, &(0x7f0000000040)) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) 04:28:38 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @rand_addr="100e0e188dec22c679daac3b6f3d26b3"}]}, &(0x7f0000000180)=0x10) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x7c, &(0x7f0000000480)={r3}, 0x14) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000040)={r3, @in6={{0xa, 0x4e20, 0x6d83, @mcast2, 0x9}}}, 0x84) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) 04:28:38 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5424, &(0x7f0000000000)) 04:28:38 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5607, 0x0) 04:28:38 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5441, 0x0) 04:28:38 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x1f, 0x100) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x0], 0x1, 0x2}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x541c, &(0x7f0000000000)) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r4, 0x0, r3, 0x0, 0x10000000008, 0x0) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{}]}) syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x10000) getsockopt$IP_SET_OP_GET_FNAME(r2, 0x1, 0x53, &(0x7f0000000140)={0x8, 0x7, 0x0, 'syz1\x00'}, &(0x7f00000001c0)=0x2c) 04:28:38 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) rt_sigpending(&(0x7f0000000140), 0x8) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) r1 = socket(0x11, 0x80a, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00'}) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f00000001c0), 0x8) sendmsg$IPCTNL_MSG_CT_GET_DYING(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x6, 0x1, 0x101, 0x0, 0x0, {0xc, 0x0, 0x9}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x200440c1}, 0x40001) r2 = getpgid(0x0) kcmp(0x0, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r3 = getpgid(0x0) kcmp(0x0, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) setpgid(r2, r3) 04:28:38 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5608, 0x0) 04:28:38 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5450, 0x0) 04:28:38 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5425, &(0x7f0000000000)) 04:28:38 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @rand_addr="100e0e188dec22c679daac3b6f3d26b3"}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x7c, &(0x7f0000000480)={r2}, 0x14) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000040)={r2, @in6={{0xa, 0x4e20, 0x6d83, @mcast2, 0x9}}}, 0x84) 04:28:38 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5609, 0x0) 04:28:38 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5451, 0x0) 04:28:38 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5427, &(0x7f0000000000)) 04:28:39 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x1f, 0x100) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x0], 0x1, 0x2}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x541c, &(0x7f0000000000)) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000000008, 0x0) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{}]}) syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x10000) 04:28:39 executing program 1: r0 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = geteuid() ioctl$SIOCAX25DELUID(r2, 0x89e2, &(0x7f0000000000)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, r3}) syz_open_dev$tty1(0xc, 0x4, 0x1) 04:28:39 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @rand_addr="100e0e188dec22c679daac3b6f3d26b3"}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x7c, &(0x7f0000000480)={r2}, 0x14) 04:28:39 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x560a, 0x0) 04:28:39 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5452, 0x0) 04:28:39 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5428, &(0x7f0000000000)) 04:28:39 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) r1 = socket(0x3, 0x6, 0x2) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00'}) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f00000001c0), 0x8) r2 = socket(0x11, 0x80a, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00'}) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f00000001c0), 0x8) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x20800, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f0000000140)={0x4, [0x8, 0x8, 0x1, 0x7]}, &(0x7f0000000180)=0xc) 04:28:39 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @rand_addr="100e0e188dec22c679daac3b6f3d26b3"}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) 04:28:39 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x1f, 0x100) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x0], 0x1, 0x2}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x541c, &(0x7f0000000000)) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000000008, 0x0) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{}]}) 04:28:39 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x560b, 0x0) 04:28:39 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5429, &(0x7f0000000000)) 04:28:39 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x545d, 0x0) 04:28:39 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @rand_addr="100e0e188dec22c679daac3b6f3d26b3"}]}, &(0x7f0000000180)=0x10) socket$inet(0x2, 0x80001, 0x84) 04:28:39 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x560c, 0x0) 04:28:39 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000000008, 0x0) setsockopt$PNPIPE_INITSTATE(r1, 0x113, 0x4, &(0x7f0000000080), 0x4) ioctl$SNDCTL_DSP_STEREO(r2, 0xc0045003, &(0x7f0000000040)=0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000240)=0x181) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r5, 0x0, r4, 0x0, 0x10000000008, 0x0) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x8, 0xffffff32, 0x800, 0x6, 0x426, 0xffffffffffffffff, 0x5, [], 0x0, r2, 0x0, 0x2, 0x1}, 0x40) getrandom(&(0x7f0000000140)=""/233, 0xe9, 0x3) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10000000008, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0xfffffffffffffffd, 0x96, 0x20, @scatter={0x3, 0x0, &(0x7f0000000300)=[{&(0x7f0000001680)=""/4096, 0x1000}, {&(0x7f0000000280)=""/65, 0x41}, {&(0x7f0000001480)=""/83, 0x53}]}, &(0x7f0000001500)="e79658a6652ec468ad8084bea8340ee4c112652fb78e84adfb3c9adf0f50613ccea50577090bf35497b2028c8201bc146fe593907899de0893439bc78ceebf3be36b4c1a0ac1347e530f8ea4cec87cbbe2aaae5a56ccab214fe7ebce8070a3555e2fe66f1aa6e469aba10b7f0bb7d3bce84ae10f70ded19eae3c0b9c2d81939e257d9de908507439d524842382f77aee02d81f862eda", &(0x7f0000000440)=""/4096, 0x0, 0x5, 0xffffffffffffffff, &(0x7f0000001440)}) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000100)=[r3, r6, r7, r0, r8], 0x5) 04:28:39 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x1f, 0x100) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x0], 0x1, 0x2}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x541c, &(0x7f0000000000)) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000000008, 0x0) 04:28:39 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5437, &(0x7f0000000000)) 04:28:39 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5460, 0x0) 04:28:39 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x560d, 0x0) 04:28:39 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5441, &(0x7f0000000000)) 04:28:39 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x1f, 0x100) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x0], 0x1, 0x2}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x541c, &(0x7f0000000000)) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x10000000008, 0x0) 04:28:39 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x560e, 0x0) 04:28:39 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @rand_addr="100e0e188dec22c679daac3b6f3d26b3"}]}, &(0x7f0000000180)=0x10) 04:28:39 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x10000000008, 0x0) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MESH(r4, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, r3, 0xf, 0x0, 0x0, {0xf, 0x10, 0x60}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x60, 0x70bd27, 0x25dfdbfb, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x4081) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r6, 0x0, r5, 0x0, 0x10000000004, 0x4) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x541c, &(0x7f0000000080)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x200000, 0x0) 04:28:39 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5600, 0x0) 04:28:39 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5450, &(0x7f0000000000)) 04:28:39 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x1f, 0x100) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x0], 0x1, 0x2}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x541c, &(0x7f0000000000)) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x10000000008, 0x0) 04:28:40 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @rand_addr="100e0e188dec22c679daac3b6f3d26b3"}]}, &(0x7f0000000180)=0x10) 04:28:40 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x560f, 0x0) 04:28:40 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5601, 0x0) 04:28:40 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5451, &(0x7f0000000000)) 04:28:40 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x10000000008, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f0000000080)=""/66) syz_open_dev$tty1(0xc, 0x4, 0x1) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000000008, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r2, 0x541c, &(0x7f0000000000)) 04:28:40 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x1f, 0x100) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x0], 0x1, 0x2}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x541c, &(0x7f0000000000)) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x10000000008, 0x0) 04:28:40 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x6364, 0x0) 04:28:40 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5602, 0x0) 04:28:40 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5452, &(0x7f0000000000)) 04:28:40 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x1f, 0x100) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x0], 0x1, 0x2}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x541c, &(0x7f0000000000)) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x10000000008, 0x0) 04:28:40 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x890b, 0x0) 04:28:40 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x8933, 0x0) 04:28:40 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @rand_addr="100e0e188dec22c679daac3b6f3d26b3"}]}, &(0x7f0000000180)=0x10) 04:28:40 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5603, 0x0) 04:28:40 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x545d, &(0x7f0000000000)) 04:28:40 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x80000020, 0x3) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x84f1326867c21285}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_START_AP(r1, &(0x7f0000001000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000fc0)={&(0x7f00000010c0)=ANY=[@ANYBLOB="f40e0000", @ANYRES16=r3, @ANYBLOB="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"], 0xef4}, 0x1, 0x0, 0x0, 0x20048080}, 0x4000801) r4 = accept(r2, 0x0, &(0x7f0000000100)) r5 = socket(0x10, 0x803, 0x4) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x14, r6, 0x2895841680237b8d}, 0x14}}, 0x0) sendmsg$TIPC_NL_BEARER_GET(r4, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r6, 0x10, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x18, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ADDR={0x8}]}, @TIPC_NLA_NODE={0xc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x8895) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) 04:28:40 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x1f, 0x100) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x0], 0x1, 0x2}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x541c, &(0x7f0000000000)) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x10000000008, 0x0) 04:28:40 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x400454ca, 0x0) 04:28:40 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5460, &(0x7f0000000000)) 04:28:40 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5605, 0x0) 04:28:40 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x1f, 0x100) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x0], 0x1, 0x2}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x541c, &(0x7f0000000000)) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x10000000008, 0x0) 04:28:40 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x40049409, 0x0) 04:28:41 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x101080) r2 = socket(0x10, 0x803, 0x4) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x14, r3, 0x2895841680237b8d}, 0x14}}, 0x60000) sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x7c, r3, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x58, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc23f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffe}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4040010}, 0x2004c001) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) 04:28:41 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x40186366, 0x0) 04:28:41 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @rand_addr="100e0e188dec22c679daac3b6f3d26b3"}]}, &(0x7f0000000180)=0x10) 04:28:41 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5606, 0x0) 04:28:41 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5600, &(0x7f0000000000)) 04:28:41 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x10000000008, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @rand_addr="100e0e188dec22c679daac3b6f3d26b3"}]}, &(0x7f0000000180)=0x10) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x7c, &(0x7f0000000480)={r5}, 0x14) splice(r3, 0x0, r2, 0x0, 0x10000000008, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r7, 0x0, r6, 0x0, 0x10000000008, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r6, 0x541c, &(0x7f0000000080)) 04:28:41 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x1f, 0x100) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x0], 0x1, 0x2}) syz_open_dev$tty1(0xc, 0x4, 0x4) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x10000000008, 0x0) 04:28:41 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4020940d, 0x0) 04:28:41 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5607, 0x0) 04:28:41 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5601, &(0x7f0000000000)) 04:28:41 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x80045432, 0x0) 04:28:41 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x1f, 0x100) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x0], 0x1, 0x2}) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x10000000008, 0x0) 04:28:41 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5608, 0x0) 04:28:42 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) 04:28:42 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5602, &(0x7f0000000000)) 04:28:42 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x80045440, 0x0) 04:28:42 executing program 4: syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x1f, 0x100) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x10000000008, 0x0) 04:28:42 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5609, 0x0) 04:28:42 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @rand_addr="100e0e188dec22c679daac3b6f3d26b3"}]}, &(0x7f0000000180)=0x10) 04:28:42 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r1, 0xc0585605, &(0x7f0000000040)={0x0, 0x2}) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000000)={0x2, 0x7f}) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r4, 0x0, r3, 0x0, 0x10000000008, 0x0) splice(r2, 0x0, r0, 0x0, 0x10000000008, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000080)) 04:28:42 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) r1 = syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r1, 0xc0585605, &(0x7f0000000040)={0x0, 0x2}) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000000040)={0x20000000, 0x8, "9d69412c5391858c1540a881a60451bf6adaab77c3769b6905ff506284ac2a77", 0x1000, 0x1, 0x8, 0x1ff, 0x3, 0x4, 0x49bd4705, 0xfffffeff, [0x9, 0x7, 0xffffff81, 0x1000]}) syz_init_net_socket$ax25(0x3, 0x2, 0x8) 04:28:42 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5603, &(0x7f0000000000)) 04:28:42 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x80086301, 0x0) 04:28:42 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x10000000008, 0x0) 04:28:42 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x560a, 0x0) 04:28:42 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @rand_addr="100e0e188dec22c679daac3b6f3d26b3"}]}, &(0x7f0000000180)=0x10) 04:28:42 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0xc0045878, 0x0) 04:28:42 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x10000000008, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r6}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r6}]}, 0x24}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) getpeername$packet(r10, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r8, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r11}) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8, 0x4, r11}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_DEL_INTERFACE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, 0x0, 0x602, 0x70bd29, 0x25dfdbfe, {}, [@NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x1}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r11}]}, 0x40}}, 0x40001) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000040)=@usbdevfs_disconnect={0xff}) 04:28:42 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5605, &(0x7f0000000000)) 04:28:43 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @rand_addr="100e0e188dec22c679daac3b6f3d26b3"}]}, &(0x7f0000000180)=0x10) 04:28:43 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x560b, 0x0) 04:28:43 executing program 4: pipe(0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000000008, 0x0) 04:28:43 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0xc0045878, 0x0) 04:28:43 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5606, &(0x7f0000000000)) 04:28:43 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @rand_addr="100e0e188dec22c679daac3b6f3d26b3"}]}, &(0x7f0000000180)=0x10) 04:28:43 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x560c, 0x0) 04:28:43 executing program 4: pipe(0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000000008, 0x0) 04:28:43 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5607, &(0x7f0000000000)) 04:28:43 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0xc0189436, 0x0) 04:28:43 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f0000000040)={{0x3a, @multicast2, 0x4e24, 0x0, 'lblc\x00', 0x10, 0x3f, 0x56}, {@loopback, 0x4e24, 0x3, 0x1ff, 0xfffffffc, 0xc4}}, 0x44) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f00000000c0)={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1c}}, {0x1, @dev={[], 0xf}}, 0x44, {0x2, 0x4e20, @multicast1}, 'ip6tnl0\x00'}) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) 04:28:43 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x560d, 0x0) 04:28:43 executing program 3: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @rand_addr="100e0e188dec22c679daac3b6f3d26b3"}]}, &(0x7f0000000180)=0x10) 04:28:43 executing program 4: pipe(0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000000008, 0x0) 04:28:43 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5608, &(0x7f0000000000)) [ 288.225601][T12153] IPVS: set_ctl: invalid protocol: 58 224.0.0.2:20004 04:28:43 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0xc020660b, 0x0) 04:28:43 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x10000000008, 0x0) 04:28:43 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x560e, 0x0) 04:28:43 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x701800, 0x0) r1 = getpgid(0x0) kcmp(0x0, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) clone3(&(0x7f0000000380)={0x8000000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000240), {0x12}, &(0x7f0000000280)=""/21, 0x15, &(0x7f00000002c0), &(0x7f0000000300)=[0xffffffffffffffff, r1], 0x2}, 0x50) tkill(r2, 0xd) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000140)={0x5, 0x5, 0x7, 0x7, 'syz1\x00', 0x4}) syz_open_dev$tty1(0xc, 0x4, 0x1) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x101000, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x20000, 0x0) r4 = socket$bt_bnep(0x1f, 0x3, 0x4) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r6, 0x0, r5, 0x0, 0x10000000008, 0x0) ioctl$IOC_PR_RESERVE(r5, 0x401070c9, &(0x7f0000000180)={0x9, 0x3, 0x1}) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) ioctl$TIOCL_GETMOUSEREPORTING(r3, 0x541c, &(0x7f0000000080)) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r8, 0x0, r7, 0x0, 0x10000000008, 0x0) ioctl$NBD_SET_BLKSIZE(r7, 0xab01, 0xb109) 04:28:43 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5609, &(0x7f0000000000)) 04:28:43 executing program 3: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @rand_addr="100e0e188dec22c679daac3b6f3d26b3"}]}, &(0x7f0000000180)=0x10) 04:28:43 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x10000000008, 0x0) 04:28:43 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) 04:28:43 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x560f, 0x0) 04:28:43 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x6364, 0x0) 04:28:43 executing program 3: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @rand_addr="100e0e188dec22c679daac3b6f3d26b3"}]}, &(0x7f0000000180)=0x10) 04:28:43 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x10000000008, 0x0) 04:28:43 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x10000000008, 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x5, 0x4, 0x6, 0x8c, 0x2}}) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4c, 0x0) 04:28:43 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10000000008, 0x0) 04:28:43 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x890b, 0x0) 04:28:44 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80200, 0x0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x110, 0x17, 0xa, 0x201, 0x0, 0x0, {0x0, 0x0, 0x5}, [@NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_HOOK={0xb8, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'erspan0\x00'}, {0x14, 0x1, 'hsr0\x00'}, {0x14, 0x1, 'wg2\x00'}, {0x14, 0x1, 'virt_wifi0\x00'}, {0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_vlan\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x8884}, 0x80) syz_open_dev$tty1(0xc, 0x4, 0x1) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x2, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10000000008, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) 04:28:44 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x8912, 0x0) 04:28:44 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @rand_addr="100e0e188dec22c679daac3b6f3d26b3"}]}, &(0x7f0000000180)=0x10) 04:28:44 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x560a, &(0x7f0000000000)) 04:28:44 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10000000008, 0x0) 04:28:44 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket(0x11, 0x80a, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00'}) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f00000001c0), 0x8) setsockopt$ax25_int(r1, 0x101, 0x0, &(0x7f0000000080)=0x7ff, 0x4) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x4b4c, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r3, 0x0, r2, 0x0, 0x10000000008, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x680, 0x0) sendmsg$NL80211_CMD_DEL_STATION(r4, &(0x7f0000000dc0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000d00)={0x88, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@NL80211_ATTR_STA_FLAGS={0x18, 0x11, 0x0, 0x1, [@NL80211_STA_FLAG_SHORT_PREAMBLE={0x4}, @NL80211_STA_FLAG_AUTHORIZED={0x4}, @NL80211_STA_FLAG_MFP={0x4}, @NL80211_STA_FLAG_MFP={0x4}, @NL80211_STA_FLAG_ASSOCIATED={0x4}]}, @NL80211_ATTR_STA_AID={0x6, 0x10, 0x2a2}, @NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES={0x2e, 0xbe, "d9c2a8dc762e5d1cb5413260e01d62d32514cc2cc346b89314ad4d6c8d9707d131beb935f0954e84f445"}, @NL80211_ATTR_PEER_AID={0x6, 0xb5, 0x5b5}, @NL80211_ATTR_VLAN_ID={0x6, 0x11a, 0x2}, @NL80211_ATTR_STA_FLAGS={0xc, 0x11, 0x0, 0x1, [@NL80211_STA_FLAG_WME={0x4}, @NL80211_STA_FLAG_WME={0x4}]}, @NL80211_ATTR_PEER_AID={0x6, 0xb5, 0x23e}]}, 0x88}, 0x1, 0x0, 0x0, 0x40088c4}, 0x20040010) openat$mice(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/input/mice\x00', 0x80701) r5 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x35, 0x410842) sendmsg$OSF_MSG_ADD(r5, &(0x7f00000002c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="640900000005010100000000000000000c00000954020100010000000100000005e109f20010030073797a300000000000000000000000000000000000000000000000000000000067c816f189d15b2b6a0427bffa8013d970aa7098ba3806e4719a1f5fb5c4fbffea1bcc26d17be534d51f1554c39b82238598851219868424119d94ea596243f43f00030003000000010000008000ff0f0100000002000000010402000300000006000000060088170200000007000000a4d8080003000000ffffffffb76d050003000000f7ffffff0200090000000000080000000100030003000000090000000300ff0f01000000010000000100000400000000070000001206080002000000e70800000400d70702000000000000000008010003000000198c00000500080002000000000001000500010000000000080000000700090003000000fffeffffff0f040000000000010000000600ab000300000042720000320605000100000096030000ff0706000300000009000000080000080100000001000080070004000100000004000000ff0102000300000004000000200003000000000008000000ff0f08000300000000010000010000010000000008000000ff07fcac02001c00553d0000ff7f02000300000009000000050000800200000000000000060001010000000005000000f8ffff0102000000020000002c01040001000000ffffff7f3f00070002000000010000000200000001000000530d000003000000020000000100000001f8fdff01000000ffff0000ff00040000000000030000000400000401000000020000000000090001000000030000000d00060002000000a12500005402010003000000ffffff7f064eff030200190073797a3100000000000000000000000000000000000000000000000000000000c76fbec57bf05a63b4b99c35a414d09f9b154ad4a9d4dd9a19a2b08892ed5d660f9c6a84ca7936b0224289aedb8bd51363197c6c35eedaa72047af9559d1c1970001ff0f00000000feffffff0004030001000000030000001f00070000000000000000000f080400020000000101000081000300010000000100010001040900010000000600000000021f00020000000300000004000900020000000100000006003f0002000000f12b0000060005000200000004000000160b000000000000080000008000000001000000ffff00000700060001000000000000000500e30f030000000000000000001f0000000000ffffffff09000100000000000100000004000600010000000600000009007c0401000000070000000700050002000000ff0f000000184703000000030000000400ff07030000000800000002000500000000000200000001003f000200000001000000ff000300010000003f000000c000070003000000ff0f00008100050800000000000004000800000000000900000008003f000300000006000000000040400000000000800000010026000000000000006017008006000200000001000000200000100100000024020000020081000200000001f0ffffffffff03030000000004000008000600030000007e000000ff7f008000000000ff720000674d010103000000ff0f00000400ffff030000007f000000d02900020000000000040000010106000000000020040000540201000000000004000000803f06000300030073797a30000000000000000000000000000000000000000000000000000000008f909d09f335260aa8ea0ec0ce4395c47664aef390cac76e03f2f0d23559e0f73f293c158573dd19c4cd9c2c4219ed4d8ff44fa9ba1eaa886eca3f33a5851c7a00f003000200000003000000000003000000000009000000070088c202000000ffffffff0800ff0700000000ffffffff5400000202000000b200000005003f000100000007000000fcff3f00010000005c0e0000fd0b3f0001000000050000000600070000000000020000000400090000000000ffff000000080001010000002d000000b606ae010000000002000000010004000300000000060000ff7f000001000000000100000900030003000000ff000000ff8d0200010000000900000006003600010000000900000006000004010000000300000007003f0003000000da17000000007f0001000000090000000800010002000000010000000200090003000000020000000400200002000000008000000400020003000000ff03000001000500030000000080000007000900020000000000000008000080030000000200000004007f000100000007000000020002000300000009000000a5001f000100000001040000be680300010000000104000028e40400020000009b000000ff0f010002000000400000000000040002000000070000000600e20000000000070000000800e60003000000f9ffffff0900010002000000a705000002000008010000002abf000007000010000000000300000001000900020000000800000054020100030000006d0d000001093e0f0500060073797a31000000000000000000000000000000000000000000000000000000009896d001fae7bc5936db20a61f13f200c6d3f1c604a39a0bc1895059e0b76c347669ec8908744ce8b4c30f67f469914b7185a246e2a888ae553b08c053437e600900080003000000faffffffff00960001000000000800007000030001000000010000002e0dff000100000000000000c80d01000200000009000000598b050000000000090000003902810002000000080000000580946d0300000001000000020007000000000005000000ff7f1800000000007f000000f7ffdd00020000000200000006000600000000000400000007000402000000002000000008000800000000000300000005000000010000000100000002000800010000000180000006000700010000002bab000001006000000000000800000001000300020000007f0000000800010000000000010100000000020000000000080000003e00000103000000000800000400040000000000080000005313010100000000a00000000200810003000000ff01000000015d570000000004000000010000000100000000000100098300fc020000000500000007000900000000000100000003003f00020000000200000006000300030000000100008000003f0003000000030000000900060003000000090000000300ff7f03000000010001000400090003000000f7ffffff06000600000000005c0000000400030003000000357880790500010000000000ffffff7f8000fbff00000000040000000800060000000000080000000000"], 0x964}, 0x1, 0x0, 0x0, 0x400d0}, 0x1) write$P9_RSETATTR(r2, &(0x7f0000000000)={0x7, 0x1b, 0x2}, 0x7) 04:28:44 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x8933, 0x0) 04:28:44 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10000000008, 0x0) 04:28:44 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x560b, &(0x7f0000000000)) 04:28:44 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x400454ca, 0x0) 04:28:44 executing program 4: pipe(&(0x7f0000000340)) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000000008, 0x0) 04:28:44 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x10000000008, 0x0) ioctl$TIOCSTI(r1, 0x5412, 0x400) write$binfmt_script(r2, &(0x7f0000000080)={'#! ', './file0', [{0x20, '/dev/urandom\x00'}, {0x20, '\xed'}, {0x20, '/dev/urandom\x00'}, {0x20, '/dev/urandom\x00'}], 0xa, "74905c9a11fa8115fbe6872cb544cec5f2945c3672d90f9b14c0c71526816d0067e9cc858ab69cd501307ef44865dce8cefc6483eae2429d667a715c119eb5d9820554f83f441e3cba4372caec23f40d82a689536a0c1ae4d0149be3549169ac5706c22efa0b750070b41e860e1848f3489c9ce3ce941a9ae13929788051e84c"}, 0xb7) open_by_handle_at(r0, &(0x7f0000000040)={0x3a, 0x5, "980b10cdc0034366685aeadb03e4e5c88270dc6f4489a27681d8f0dd1c8fa705e0e0848c291ede223bb0d83492a4cc360802"}, 0x48000) 04:28:44 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x560c, &(0x7f0000000000)) 04:28:44 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x40049409, 0x0) 04:28:45 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @rand_addr="100e0e188dec22c679daac3b6f3d26b3"}]}, &(0x7f0000000180)=0x10) 04:28:45 executing program 4: pipe(&(0x7f0000000340)) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000000008, 0x0) 04:28:45 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x10000000008, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) splice(r5, 0x0, r4, 0x0, 0x10000000008, 0x0) write$tun(r4, &(0x7f0000000100)={@val={0x0, 0xf6}, @void, @ipx={0xffff, 0x67, 0x0, 0x5, {@random=0x20, @random="7c6c9502ed7a", 0x4}, {@current, @random="7ebf3f02ca6f", 0x1ffe}, "0368793badb7a63fda613976b0ea3bef6309254226abe99d3f7b91909ec34b852b366a014b85661dd382d8bb9a54d271d1f10bf12f49696d83dc1335f94552d44d52d1aecd2879a614"}}, 0x6b) splice(r3, 0x0, r2, 0x0, 0x10000000008, 0x0) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f00000000c0)={0xf6, 0x0, 0xa39e, 0x3, 0x7}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) fcntl$getown(r0, 0x9) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r6, 0x541c, &(0x7f0000000000))