0', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:09 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 684.609373] EXT4-fs (sda1): Unrecognized mount option "commiô50x0000000" or missing value [ 684.649438] ptrace attach of "/root/syz-executor.3"[18699] was attempted by "/root/syz-executor.3"[18702] 04:32:09 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x230000, 0x0) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000100)=0x8, 0x2) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_inet_SIOCGIFBRDADDR(r5, 0x8919, &(0x7f0000000140)={'ifb0\x00', {0x2, 0x4e23, @rand_addr=0x9611}}) r6 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r7) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x11}}], [{@euid_gt={'euid>', r7}}, {@euid_lt={'euid<', r7}}]}) 04:32:09 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)=ANY=[@ANYBLOB="636f6d200074fa3f00"/20]) 04:32:09 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, &(0x7f0000000080)) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x144, 0x0, 0x151a8ca, &(0x7f0000000100)=ANY=[]) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000100)={0x38, 0x7, 0x0, 0x8}, 0x8) 04:32:09 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="282f66616c6519cfa1e1b98445e6bacd3000"], &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_opts(r4, 0x0, 0x9, &(0x7f0000000240)="a94a23897df77efc46b9d3e3b12d396a2195ff79b9579351522f080f13c85977143408c770e75508337c3f70b9343fe6c1d87add5986a7a0b4b7f7a4f2f75908d5f6c25ac68d496b0175d29e14957286b5cddb1673565ff99a003ddd24c8f208eb36978bd6b2886e0dadc44db921a791c656ee09f32c4cba71bf66b79ee74b016e56e7efeb106220bfb32fd5b9eedbc79c1a9c14228ac9fc726c7b1614e6dd58930c228507f259d8a5b7adb3a57462e93e2881fd11b3eac830a3964c1151dabbdfa099fe37530e1de2602109c9b38daabda73e359d38dece633f564801e37f4b37a71860db", 0xe5) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x216, 0x0, 0x15080e9, &(0x7f0000000100)={[{@resgid={'resgid'}}, {@prjquota='prjquota'}, {@nombcache='nombcache'}]}) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r5, 0x84, 0x1e, &(0x7f00000000c0), &(0x7f0000000140)=0x4) 04:32:09 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) r3 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x2000) ioctl$NBD_DO_IT(r3, 0xab03) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="3074fbff1b419267ff149b3f00000000"], &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) recvmsg$kcm(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000002540)=[{&(0x7f0000000240)=""/110, 0x6e}, {&(0x7f00000002c0)=""/120, 0x78}, {&(0x7f0000000340)=""/163, 0xa3}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000001400)=""/127, 0x7f}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)=""/182, 0xb6}], 0x7, &(0x7f00000025c0)=""/179, 0xb3}, 0x10000) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit', 0x3d, 0x11}}]}) [ 684.809573] EXT4-fs (sda1): Unrecognized mount option "com " or missing value 04:32:09 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x8, 0x22002) ioctl$VT_SETMODE(r3, 0x5602, &(0x7f0000000240)={0x8, 0x7, 0x7, 0x5388, 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x4000000000000, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@dax='dax'}]}) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 04:32:09 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x8000) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit', 0x3d, 0x11}}]}) [ 684.928681] EXT4-fs (sda1): DAX enabled. Warning: EXPERIMENTAL, use at your own risk [ 684.954788] EXT4-fs (sda1): warning: refusing change of dax flag with busy inodes while remounting [ 684.965835] EXT4-fs (sda1): re-mounted. Opts: dax, [ 684.990581] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000011, [ 685.029350] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000011, 04:32:10 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0), 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:10 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)=ANY=[@ANYBLOB='uommit=0x0000000000000000,\x00']) [ 685.945570] IPVS: ftp: loaded support on port[0] = 21 04:32:12 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() r4 = socket$inet(0x2, 0x800, 0x20000000084) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000000)={'n\xc7y\x00', 0x0, 0x0, 0x0, [], 0xfffffffffffffefa, 0x0, 0x0}, &(0x7f0000001280)=0x3d) ptrace$setopts(0x4206, r3, 0x0, 0x0) r5 = gettid() tkill(r5, 0x16) 04:32:12 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="fddf02c6b42e2f66"], &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x4d8a40, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r3, 0x40087705, &(0x7f0000000100)={0x9, 0x7}) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)=ANY=[@ANYBLOB='commit=0x000*000000000011,\x00']) 04:32:12 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a5", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:12 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r3) fallocate(r4, 0x8, 0x7, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) 04:32:12 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:12 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2], 0x2}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 687.676507] EXT4-fs: 1 callbacks suppressed [ 687.676520] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, 04:32:12 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f00000000c0)='./file0\x00', 0x40, 0x32) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2e2f309bfd9076c2a4cdf96cc6b34d00"], &(0x7f0000000180)='./file0\x00', 0x0, 0x1981050, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000100)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303030303030303030303031312ca1003b4bb324e43c05ef17a0a2a23d8510f17f85a5afea88bb980bb88c6db60d7997f00592a565ccce138b3ece15a3a48bfbc6a6e6d674bac982eb4d00bb8ce05ef59eee"]) [ 687.769728] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, 04:32:12 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f00000000c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) [ 687.823397] IPVS: ftp: loaded support on port[0] = 21 04:32:12 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2], 0x2}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:12 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000240)={@dev, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000280)=0x20) [ 687.952067] tmpfs: Bad mount option commit 04:32:12 executing program 2: 04:32:12 executing program 2: [ 688.112919] IPVS: ftp: loaded support on port[0] = 21 [ 688.196064] IPVS: ftp: loaded support on port[0] = 21 04:32:15 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x31}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r4}]]}}}]}, 0x40}}, 0x0) connect$packet(r1, &(0x7f0000000400)={0x11, 0x16, r4, 0x1, 0x7}, 0x14) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = gettid() r8 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$EBT_SO_GET_ENTRIES(r8, 0x0, 0x83, &(0x7f0000000000)={'n\xc7y\x00', 0x0, 0x0, 0x0, [], 0xfffffffffffffefa, 0x0, 0x0}, &(0x7f0000001280)=0xffffffffffffff69) ptrace$setopts(0x4206, r7, 0x0, 0x0) r9 = gettid() tkill(r9, 0x16) 04:32:15 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a5", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:15 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000000c0)={'TPROXY\x00'}, &(0x7f0000000240)=0x1e) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) r3 = socket(0x100001400000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="2400000052001f0014f97407010904000200071008000100010000000800800000000000", 0x54a) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000000480)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x1, @mcast2, 0x8}, {0xa, 0x4e24, 0x2, @local, 0x63}, r8, 0x4}}, 0x48) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000080)={0x1, 0x5}, 0x8) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000100)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303030303030303030303030302c00485e7f1f7bec29a4a4f09a4628ef05936b930e243a5bc4d87dc7aa6a03e841619258cb02ad7ab8f3e3f5d039ebf8508378d9b49183530821af"]) 04:32:15 executing program 2: 04:32:15 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:15 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2], 0x2}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:15 executing program 2: 04:32:15 executing program 2: [ 690.735303] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, [ 690.781135] IPv6: sit3: Disabled Multicast RS 04:32:15 executing program 2: 04:32:15 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000600)='bpf\x00\xe4\x9b\x01z\x0e\x02\x1a\xf9\xb3X\x0f\x96\xe7\xdf\x0f&8\xd0\xba\xc1\x03B5t\xab\x1c\x94b\x8e\xfe\xb2b\xfcp2af\xb6\xc3vj^#\xff\xda<\xa4\xe9\x80\xb3\xc4\x1b\xf8\v\xf68\x0e\xba\x14q\xa4\xdb\xe6\xf3\x04\xc8m\x12\x82\xdeT\x9fe\xfc\xb2FY\xc7Z\xafJ\x13.-\x84EN\x97\x06E\btP\xd3\x9fag\x9c\x1e\x00\xa9C\xb7\xa47\x9f9\xc9\xa3\xc8\x83\x85*\x18\xd2\x0f\x04\x17r\x0e\xbc}\xefB:\xe2\x05\xb6T\x94\xa8\x87\x1c\n3tN\xe9\xbcP]\xc1\xa3,1\xc6\x0f\xfb2\xdcG\xdf8_A\xacvH|\xe8\f0\xdd_\xe8\b\x00%v>\x12.\xd2\xd5J\xa0\xcd\xc1\xf0\x8b\xaa\xd0\x83)\xd3\xa7\x8a^S\xed\xa1\x83\xa5H\xf3\xba\x17C!\xc7GX\xa8\xc7u\r\x15ub\xfc\fU\x005^v\x8c\x1a\xcb\vi\x99\xe4el\xc4\xa7\xb8\x7f\x02\xd5\xe3$\xe3\x9d\x002\x96\x91\v.*\xa5I\xb0', 0x1) pwrite64(r2, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r2, 0x0) lseek(r1, 0x0, 0x1) sendfile(r2, r2, &(0x7f0000000440), 0x20) sendfile(r2, r2, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x9, 0x7f, 0xfff, 0x3, 0x0, 0x9, 0x80401, 0x8, 0x2, 0x801, 0x2, 0x0, 0x0, 0x1, 0x20, 0x4de, 0x7fff, 0x101, 0x1ff, 0x8, 0xc4, 0x9, 0x81, 0x8, 0x88f, 0xba5e, 0x6, 0x6, 0x1, 0x5, 0x1ff, 0x81, 0x7, 0x8, 0x7ff, 0x56, 0x0, 0xffffffff, 0x4, @perf_bp={&(0x7f0000000240), 0x2}, 0x1000, 0x3b3b, 0x8, 0x6, 0x1d9981b5, 0x8, 0x7}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0x1) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) getdents(r6, &(0x7f0000000100)=""/92, 0x54) getdents64(r6, &(0x7f0000000200)=""/191, 0xbf) write$char_usb(r6, &(0x7f0000000180)="0a5726aa7f43d1a654e91d645530ed94e9252a60", 0x14) write$UHID_CREATE2(r3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"/760], 0x1) sendfile(r4, r5, 0x0, 0x8000) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) ioctl$KDGETLED(r5, 0x4b31, &(0x7f0000000000)) mkdir(0x0, 0x0) getpeername(r5, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000780)='TIPC\x00') ioctl$sock_SIOCDELDLCI(r4, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x1910824, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='pagemap\x00') fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)) [ 690.814361] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, 04:32:15 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2e2f696c65300021975f87c2c4433894db88eb1eef0724ffffcd3ea6b931e46bc33a32e092f0b87482a977"], &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000040)=ANY=[@ANYBLOB="239894d8bf2b2141f76f6d5869743dc37830303030303030303030203030302b7848b547442a1f5865807505f7bc30302cf2"]) 04:32:15 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r1, &(0x7f0000004cc0)=[{{&(0x7f0000000100)=@l2, 0x80, &(0x7f0000002300)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/143, 0x8f}, {&(0x7f0000001300)=""/4096, 0x1000}], 0x3, &(0x7f0000002340)=""/236, 0xec}, 0x7f}, {{&(0x7f0000002440)=@x25, 0x80, &(0x7f0000002880)=[{&(0x7f00000024c0)=""/121, 0x79}, {&(0x7f0000002540)=""/11, 0xb}, {&(0x7f0000002580)=""/7, 0x7}, {&(0x7f00000025c0)=""/11, 0xb}, {&(0x7f0000002600)=""/214, 0xd6}, {&(0x7f0000002700)=""/242, 0xf2}, {&(0x7f0000002800)=""/72, 0x48}], 0x7}, 0xffffffc1}, {{&(0x7f0000002900)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000003c40)=[{&(0x7f0000002980)=""/156, 0x9c}, {&(0x7f0000002a40)=""/200, 0xc8}, {&(0x7f0000002b40)=""/158, 0x9e}, {&(0x7f0000002c00)=""/4096, 0x1000}, {&(0x7f0000003c00)=""/32, 0x20}], 0x5, &(0x7f0000003cc0)=""/4096, 0x1000}, 0x7}], 0x3, 0x40, &(0x7f0000004d80)={0x77359400}) r3 = open(&(0x7f0000000000)='./file0\x00', 0x1114c1, 0x80) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x784f}, 0x8) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) [ 691.121562] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, [ 691.360129] protocol 88fb is buggy, dev hsr_slave_0 [ 691.360159] protocol 88fb is buggy, dev hsr_slave_1 [ 691.365310] protocol 88fb is buggy, dev hsr_slave_1 [ 691.375421] protocol 88fb is buggy, dev hsr_slave_0 [ 691.380511] protocol 88fb is buggy, dev hsr_slave_1 [ 691.920156] protocol 88fb is buggy, dev hsr_slave_0 [ 691.925303] protocol 88fb is buggy, dev hsr_slave_1 [ 692.400168] protocol 88fb is buggy, dev hsr_slave_0 [ 692.405265] protocol 88fb is buggy, dev hsr_slave_1 [ 693.440155] protocol 88fb is buggy, dev hsr_slave_0 04:32:18 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:18 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) r4 = dup(r3) ioctl$CAPI_CLR_FLAGS(r4, 0x80044325, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, 0x0) open(0x0, 0x143042, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r5 = gettid() tkill(r5, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) getpid() mknod(&(0x7f0000000580)='./file0\x00', 0x0, 0x0) r6 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x10c400, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r6, 0x5386, &(0x7f0000000100)) pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r7 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r7, &(0x7f0000000640)={0x28, 0x0, 0x0, @my=0x0}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)=ANY=[@ANYBLOB="636f6d6d69743d3078303030b03030303030303030303030302c00"]) 04:32:18 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:18 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a5", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:18 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r3 = socket(0x100001400000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="2400000052001f0014f97407010904000200071008000100010000000800800000000000", 0x54a) accept4$x25(r3, &(0x7f0000000080), &(0x7f00000000c0)=0x12, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() r5 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$EBT_SO_GET_ENTRIES(r5, 0x0, 0x83, &(0x7f0000000000)={'n\xc7y\x00', 0x0, 0x0, 0x0, [], 0xfffffffffffffefa, 0x0, 0x0}, &(0x7f0000001280)=0x3d) ptrace$setopts(0x4206, r4, 0x0, 0x0) r6 = gettid() tkill(r6, 0x16) 04:32:18 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000600)='bpf\x00\xe4\x9b\x01z\x0e\x02\x1a\xf9\xb3X\x0f\x96\xe7\xdf\x0f&8\xd0\xba\xc1\x03B5t\xab\x1c\x94b\x8e\xfe\xb2b\xfcp2af\xb6\xc3vj^#\xff\xda<\xa4\xe9\x80\xb3\xc4\x1b\xf8\v\xf68\x0e\xba\x14q\xa4\xdb\xe6\xf3\x04\xc8m\x12\x82\xdeT\x9fe\xfc\xb2FY\xc7Z\xafJ\x13.-\x84EN\x97\x06E\btP\xd3\x9fag\x9c\x1e\x00\xa9C\xb7\xa47\x9f9\xc9\xa3\xc8\x83\x85*\x18\xd2\x0f\x04\x17r\x0e\xbc}\xefB:\xe2\x05\xb6T\x94\xa8\x87\x1c\n3tN\xe9\xbcP]\xc1\xa3,1\xc6\x0f\xfb2\xdcG\xdf8_A\xacvH|\xe8\f0\xdd_\xe8\b\x00%v>\x12.\xd2\xd5J\xa0\xcd\xc1\xf0\x8b\xaa\xd0\x83)\xd3\xa7\x8a^S\xed\xa1\x83\xa5H\xf3\xba\x17C!\xc7GX\xa8\xc7u\r\x15ub\xfc\fU\x005^v\x8c\x1a\xcb\vi\x99\xe4el\xc4\xa7\xb8\x7f\x02\xd5\xe3$\xe3\x9d\x002\x96\x91\v.*\xa5I\xb0', 0x1) pwrite64(r2, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r2, 0x0) lseek(r1, 0x0, 0x1) sendfile(r2, r2, &(0x7f0000000440), 0x20) sendfile(r2, r2, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x9, 0x7f, 0xfff, 0x3, 0x0, 0x9, 0x80401, 0x8, 0x2, 0x801, 0x2, 0x0, 0x0, 0x1, 0x20, 0x4de, 0x7fff, 0x101, 0x1ff, 0x8, 0xc4, 0x9, 0x81, 0x8, 0x88f, 0xba5e, 0x6, 0x6, 0x1, 0x5, 0x1ff, 0x81, 0x7, 0x8, 0x7ff, 0x56, 0x0, 0xffffffff, 0x4, @perf_bp={&(0x7f0000000240), 0x2}, 0x1000, 0x3b3b, 0x8, 0x6, 0x1d9981b5, 0x8, 0x7}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0x1) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) getdents(r6, &(0x7f0000000100)=""/92, 0x54) getdents64(r6, &(0x7f0000000200)=""/191, 0xbf) write$char_usb(r6, &(0x7f0000000180)="0a5726aa7f43d1a654e91d645530ed94e9252a60", 0x14) write$UHID_CREATE2(r3, &(0x7f0000000a80)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000019000008394c6d59262cb61ff916829f820000000000000000004000000000dcea1523674e4fc200000000000000000000000000000000049dec26a8eb6f5a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a31000000000000000000362ad839b57fbecc00000000000000000000000000000000000000000000bff0e7c972e359a773bca600de00000000000000000000000000000032118300acc200b01dc63dfe97d900010400000081615271deb1a003a318d441d8ef0ba51947190a0bb05049ddb68644e3b64f21174d5afe551699d9c26de9edec7b4bae4b4fda8eaef1ce8d81da25fb9ca96d5e3fd0f47e906cf9778553a9341e9ee2a88f216bba214c5aea3b72f6988a15cffdc36009808c7c4ee3aa99097dc476067ef62c5d4cc612e3be0627edf3547297389fd6d3977aa1bb8100000000000000000000063887e2662ce8a60f81e1bc1dff064ecd04df4f063773e1f878fd338a2b813394731a2f2b5bb16d331876cc55fd49181ff33e79f42b014daa08ecb7b44dbb897ba998b987878064f146150ca6722b66990c998f847fbc7a8338f00c9268443f41784373c9690b53f641f2d6b5b2b249d2f0fbb91c1d3be4f2a0578fea66011fe78a22b8ce7e4a48421a742cc908189331efd9bb8fd889ff682634327c7d650e44d8ec18213cb4f7a4892c12fac30f156d61618a969bd4a93fc75ee1140fa66968336b3f00000000d190971440ffa5f20382fa38cde3b73e7cdaefc4ad041f26d75dca7a16e8cbd56908475ae02f6cffe7e16b796c538f7d8cc12e8b2a5d8ad45132e02c1156183ce92efc028cc8f510f58d0c49635ada4a82aa0046ab126f0fc9975636c4a9adeb895a73c582fbbc9b420ed7eabd1ffd76a9935a620d13f57ff981b79a0dcb819efb6b8876bfcd99720bf767ad6debe80eb57e87d304dc00"/760], 0x1) sendfile(r4, r5, 0x0, 0x8000) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) ioctl$KDGETLED(r5, 0x4b31, &(0x7f0000000000)) mkdir(0x0, 0x0) getpeername(r5, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000780)='TIPC\x00') ioctl$sock_SIOCDELDLCI(r4, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x1910824, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='pagemap\x00') fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)) 04:32:18 executing program 5: rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x100001400000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="2400000052001f0014f97407010904000200071008000100010000000800800000000000", 0x54a) accept4$unix(r2, 0x0, &(0x7f00000000c0), 0x80000) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='./fild0\x00'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) [ 693.791776] devpts: called with bogus options 04:32:18 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x100) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) [ 693.949263] IPVS: ftp: loaded support on port[0] = 21 [ 694.033682] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, 04:32:18 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 694.154636] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, 04:32:18 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x800) ioctl$RTC_AIE_ON(r2, 0x7001) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) [ 694.195556] IPVS: ftp: loaded support on port[0] = 21 04:32:18 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:18 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r3) ioctl$void(r3, 0xc0045878) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) mkdirat$cgroup(r7, &(0x7f00000000c0)='syz0\x00', 0x1ff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f0000000140)={0x4, 0x100000, 0x400, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1}, 0x10) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$P9_RVERSION(r10, &(0x7f0000000100)={0x13, 0x65, 0xffff, 0x3f, 0x6, '9P2000'}, 0x13) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) 04:32:19 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000240)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303030303030303030303030302c00a4609fef492fe69f45a8a4d14d2ccb5633571091ccbb88b4710e1f275bfe489423f8c94b978847a83838ac3a3946dc547df1828f4b1d568c8eaa51f3853bf997e5b4e2fc9e9078522c52881b0282a7313b4ead44ef72fb88851701d93cfeae1e82e3395db95cee43d7ec4eca85c2347da0bde4c5988d08986cdc532e997add0552f1564415c5baf2e5af15d78db8e94935c1af665958352013f028fdaa897bd8e487d7cde0c34192316c79"]) [ 694.416283] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, [ 694.446474] IPVS: ftp: loaded support on port[0] = 21 04:32:19 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000600)='bpf\x00\xe4\x9b\x01z\x0e\x02\x1a\xf9\xb3X\x0f\x96\xe7\xdf\x0f&8\xd0\xba\xc1\x03B5t\xab\x1c\x94b\x8e\xfe\xb2b\xfcp2af\xb6\xc3vj^#\xff\xda<\xa4\xe9\x80\xb3\xc4\x1b\xf8\v\xf68\x0e\xba\x14q\xa4\xdb\xe6\xf3\x04\xc8m\x12\x82\xdeT\x9fe\xfc\xb2FY\xc7Z\xafJ\x13.-\x84EN\x97\x06E\btP\xd3\x9fag\x9c\x1e\x00\xa9C\xb7\xa47\x9f9\xc9\xa3\xc8\x83\x85*\x18\xd2\x0f\x04\x17r\x0e\xbc}\xefB:\xe2\x05\xb6T\x94\xa8\x87\x1c\n3tN\xe9\xbcP]\xc1\xa3,1\xc6\x0f\xfb2\xdcG\xdf8_A\xacvH|\xe8\f0\xdd_\xe8\b\x00%v>\x12.\xd2\xd5J\xa0\xcd\xc1\xf0\x8b\xaa\xd0\x83)\xd3\xa7\x8a^S\xed\xa1\x83\xa5H\xf3\xba\x17C!\xc7GX\xa8\xc7u\r\x15ub\xfc\fU\x005^v\x8c\x1a\xcb\vi\x99\xe4el\xc4\xa7\xb8\x7f\x02\xd5\xe3$\xe3\x9d\x002\x96\x91\v.*\xa5I\xb0', 0x1) pwrite64(r2, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r2, 0x0) lseek(r1, 0x0, 0x1) sendfile(r2, r2, &(0x7f0000000440), 0x20) sendfile(r2, r2, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x9, 0x7f, 0xfff, 0x3, 0x0, 0x9, 0x80401, 0x8, 0x2, 0x801, 0x2, 0x0, 0x0, 0x1, 0x20, 0x4de, 0x7fff, 0x101, 0x1ff, 0x8, 0xc4, 0x9, 0x81, 0x8, 0x88f, 0xba5e, 0x6, 0x6, 0x1, 0x5, 0x1ff, 0x81, 0x7, 0x8, 0x7ff, 0x56, 0x0, 0xffffffff, 0x4, @perf_bp={&(0x7f0000000240), 0x2}, 0x1000, 0x3b3b, 0x8, 0x6, 0x1d9981b5, 0x8, 0x7}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0x1) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) getdents(r6, &(0x7f0000000100)=""/92, 0x54) getdents64(r6, &(0x7f0000000200)=""/191, 0xbf) write$char_usb(r6, &(0x7f0000000180)="0a5726aa7f43d1a654e91d645530ed94e9252a60", 0x14) write$UHID_CREATE2(r3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"/760], 0x1) sendfile(r4, r5, 0x0, 0x8000) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) ioctl$KDGETLED(r5, 0x4b31, &(0x7f0000000000)) mkdir(0x0, 0x0) getpeername(r5, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000780)='TIPC\x00') ioctl$sock_SIOCDELDLCI(r4, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x1910824, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='pagemap\x00') fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)) [ 694.587248] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, 04:32:19 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d9e3a40f9", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:19 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:21 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:21 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:21 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000600)='bpf\x00\xe4\x9b\x01z\x0e\x02\x1a\xf9\xb3X\x0f\x96\xe7\xdf\x0f&8\xd0\xba\xc1\x03B5t\xab\x1c\x94b\x8e\xfe\xb2b\xfcp2af\xb6\xc3vj^#\xff\xda<\xa4\xe9\x80\xb3\xc4\x1b\xf8\v\xf68\x0e\xba\x14q\xa4\xdb\xe6\xf3\x04\xc8m\x12\x82\xdeT\x9fe\xfc\xb2FY\xc7Z\xafJ\x13.-\x84EN\x97\x06E\btP\xd3\x9fag\x9c\x1e\x00\xa9C\xb7\xa47\x9f9\xc9\xa3\xc8\x83\x85*\x18\xd2\x0f\x04\x17r\x0e\xbc}\xefB:\xe2\x05\xb6T\x94\xa8\x87\x1c\n3tN\xe9\xbcP]\xc1\xa3,1\xc6\x0f\xfb2\xdcG\xdf8_A\xacvH|\xe8\f0\xdd_\xe8\b\x00%v>\x12.\xd2\xd5J\xa0\xcd\xc1\xf0\x8b\xaa\xd0\x83)\xd3\xa7\x8a^S\xed\xa1\x83\xa5H\xf3\xba\x17C!\xc7GX\xa8\xc7u\r\x15ub\xfc\fU\x005^v\x8c\x1a\xcb\vi\x99\xe4el\xc4\xa7\xb8\x7f\x02\xd5\xe3$\xe3\x9d\x002\x96\x91\v.*\xa5I\xb0', 0x1) pwrite64(r2, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r2, 0x0) lseek(r1, 0x0, 0x1) sendfile(r2, r2, &(0x7f0000000440), 0x20) sendfile(r2, r2, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x9, 0x7f, 0xfff, 0x3, 0x0, 0x9, 0x80401, 0x8, 0x2, 0x801, 0x2, 0x0, 0x0, 0x1, 0x20, 0x4de, 0x7fff, 0x101, 0x1ff, 0x8, 0xc4, 0x9, 0x81, 0x8, 0x88f, 0xba5e, 0x6, 0x6, 0x1, 0x5, 0x1ff, 0x81, 0x7, 0x8, 0x7ff, 0x56, 0x0, 0xffffffff, 0x4, @perf_bp={&(0x7f0000000240), 0x2}, 0x1000, 0x3b3b, 0x8, 0x6, 0x1d9981b5, 0x8, 0x7}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0x1) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) getdents(r6, &(0x7f0000000100)=""/92, 0x54) getdents64(r6, &(0x7f0000000200)=""/191, 0xbf) write$char_usb(r6, &(0x7f0000000180)="0a5726aa7f43d1a654e91d645530ed94e9252a60", 0x14) write$UHID_CREATE2(r3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"/760], 0x1) sendfile(r4, r5, 0x0, 0x8000) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) ioctl$KDGETLED(r5, 0x4b31, &(0x7f0000000000)) mkdir(0x0, 0x0) getpeername(r5, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000780)='TIPC\x00') ioctl$sock_SIOCDELDLCI(r4, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x1910824, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='pagemap\x00') fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)) 04:32:21 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:21 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SG_GET_LOW_DMA(r5, 0x227a, &(0x7f0000000080)) r6 = gettid() r7 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$EBT_SO_GET_ENTRIES(r7, 0x0, 0x83, &(0x7f0000000000)={'n\xc7y\x00', 0x0, 0x0, 0x0, [], 0xfffffffffffffefa, 0x0, 0x0}, &(0x7f0000001280)=0x3d) ptrace$setopts(0x4206, r6, 0x0, 0x0) r8 = gettid() ioctl$SG_SET_FORCE_PACK_ID(r5, 0x227b, &(0x7f00000000c0)) tkill(r8, 0x16) r9 = creat(&(0x7f0000000100)='./file0\x00', 0x130) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r9, 0x3) 04:32:22 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000600)='bpf\x00\xe4\x9b\x01z\x0e\x02\x1a\xf9\xb3X\x0f\x96\xe7\xdf\x0f&8\xd0\xba\xc1\x03B5t\xab\x1c\x94b\x8e\xfe\xb2b\xfcp2af\xb6\xc3vj^#\xff\xda<\xa4\xe9\x80\xb3\xc4\x1b\xf8\v\xf68\x0e\xba\x14q\xa4\xdb\xe6\xf3\x04\xc8m\x12\x82\xdeT\x9fe\xfc\xb2FY\xc7Z\xafJ\x13.-\x84EN\x97\x06E\btP\xd3\x9fag\x9c\x1e\x00\xa9C\xb7\xa47\x9f9\xc9\xa3\xc8\x83\x85*\x18\xd2\x0f\x04\x17r\x0e\xbc}\xefB:\xe2\x05\xb6T\x94\xa8\x87\x1c\n3tN\xe9\xbcP]\xc1\xa3,1\xc6\x0f\xfb2\xdcG\xdf8_A\xacvH|\xe8\f0\xdd_\xe8\b\x00%v>\x12.\xd2\xd5J\xa0\xcd\xc1\xf0\x8b\xaa\xd0\x83)\xd3\xa7\x8a^S\xed\xa1\x83\xa5H\xf3\xba\x17C!\xc7GX\xa8\xc7u\r\x15ub\xfc\fU\x005^v\x8c\x1a\xcb\vi\x99\xe4el\xc4\xa7\xb8\x7f\x02\xd5\xe3$\xe3\x9d\x002\x96\x91\v.*\xa5I\xb0', 0x1) pwrite64(r2, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r2, 0x0) lseek(r1, 0x0, 0x1) sendfile(r2, r2, &(0x7f0000000440), 0x20) sendfile(r2, r2, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x9, 0x7f, 0xfff, 0x3, 0x0, 0x9, 0x80401, 0x8, 0x2, 0x801, 0x2, 0x0, 0x0, 0x1, 0x20, 0x4de, 0x7fff, 0x101, 0x1ff, 0x8, 0xc4, 0x9, 0x81, 0x8, 0x88f, 0xba5e, 0x6, 0x6, 0x1, 0x5, 0x1ff, 0x81, 0x7, 0x8, 0x7ff, 0x56, 0x0, 0xffffffff, 0x4, @perf_bp={&(0x7f0000000240), 0x2}, 0x1000, 0x3b3b, 0x8, 0x6, 0x1d9981b5, 0x8, 0x7}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0x1) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) getdents(r6, &(0x7f0000000100)=""/92, 0x54) getdents64(r6, &(0x7f0000000200)=""/191, 0xbf) write$char_usb(r6, &(0x7f0000000180)="0a5726aa7f43d1a654e91d645530ed94e9252a60", 0x14) write$UHID_CREATE2(r3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"/760], 0x1) sendfile(r4, r5, 0x0, 0x8000) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) ioctl$KDGETLED(r5, 0x4b31, &(0x7f0000000000)) mkdir(0x0, 0x0) getpeername(r5, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000780)='TIPC\x00') ioctl$sock_SIOCDELDLCI(r4, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x1910824, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='pagemap\x00') fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)) 04:32:22 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:22 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:22 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:22 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000600)='bpf\x00\xe4\x9b\x01z\x0e\x02\x1a\xf9\xb3X\x0f\x96\xe7\xdf\x0f&8\xd0\xba\xc1\x03B5t\xab\x1c\x94b\x8e\xfe\xb2b\xfcp2af\xb6\xc3vj^#\xff\xda<\xa4\xe9\x80\xb3\xc4\x1b\xf8\v\xf68\x0e\xba\x14q\xa4\xdb\xe6\xf3\x04\xc8m\x12\x82\xdeT\x9fe\xfc\xb2FY\xc7Z\xafJ\x13.-\x84EN\x97\x06E\btP\xd3\x9fag\x9c\x1e\x00\xa9C\xb7\xa47\x9f9\xc9\xa3\xc8\x83\x85*\x18\xd2\x0f\x04\x17r\x0e\xbc}\xefB:\xe2\x05\xb6T\x94\xa8\x87\x1c\n3tN\xe9\xbcP]\xc1\xa3,1\xc6\x0f\xfb2\xdcG\xdf8_A\xacvH|\xe8\f0\xdd_\xe8\b\x00%v>\x12.\xd2\xd5J\xa0\xcd\xc1\xf0\x8b\xaa\xd0\x83)\xd3\xa7\x8a^S\xed\xa1\x83\xa5H\xf3\xba\x17C!\xc7GX\xa8\xc7u\r\x15ub\xfc\fU\x005^v\x8c\x1a\xcb\vi\x99\xe4el\xc4\xa7\xb8\x7f\x02\xd5\xe3$\xe3\x9d\x002\x96\x91\v.*\xa5I\xb0', 0x1) pwrite64(r2, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r2, 0x0) lseek(r1, 0x0, 0x1) sendfile(r2, r2, &(0x7f0000000440), 0x20) sendfile(r2, r2, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x9, 0x7f, 0xfff, 0x3, 0x0, 0x9, 0x80401, 0x8, 0x2, 0x801, 0x2, 0x0, 0x0, 0x1, 0x20, 0x4de, 0x7fff, 0x101, 0x1ff, 0x8, 0xc4, 0x9, 0x81, 0x8, 0x88f, 0xba5e, 0x6, 0x6, 0x1, 0x5, 0x1ff, 0x81, 0x7, 0x8, 0x7ff, 0x56, 0x0, 0xffffffff, 0x4, @perf_bp={&(0x7f0000000240), 0x2}, 0x1000, 0x3b3b, 0x8, 0x6, 0x1d9981b5, 0x8, 0x7}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0x1) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) getdents(r6, &(0x7f0000000100)=""/92, 0x54) getdents64(r6, &(0x7f0000000200)=""/191, 0xbf) write$char_usb(r6, &(0x7f0000000180)="0a5726aa7f43d1a654e91d645530ed94e9252a60", 0x14) write$UHID_CREATE2(r3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"/760], 0x1) sendfile(r4, r5, 0x0, 0x8000) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) ioctl$KDGETLED(r5, 0x4b31, &(0x7f0000000000)) mkdir(0x0, 0x0) getpeername(r5, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000780)='TIPC\x00') ioctl$sock_SIOCDELDLCI(r4, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x1910824, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='pagemap\x00') fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)) 04:32:23 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:23 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc3", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:23 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:23 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000600)='bpf\x00\xe4\x9b\x01z\x0e\x02\x1a\xf9\xb3X\x0f\x96\xe7\xdf\x0f&8\xd0\xba\xc1\x03B5t\xab\x1c\x94b\x8e\xfe\xb2b\xfcp2af\xb6\xc3vj^#\xff\xda<\xa4\xe9\x80\xb3\xc4\x1b\xf8\v\xf68\x0e\xba\x14q\xa4\xdb\xe6\xf3\x04\xc8m\x12\x82\xdeT\x9fe\xfc\xb2FY\xc7Z\xafJ\x13.-\x84EN\x97\x06E\btP\xd3\x9fag\x9c\x1e\x00\xa9C\xb7\xa47\x9f9\xc9\xa3\xc8\x83\x85*\x18\xd2\x0f\x04\x17r\x0e\xbc}\xefB:\xe2\x05\xb6T\x94\xa8\x87\x1c\n3tN\xe9\xbcP]\xc1\xa3,1\xc6\x0f\xfb2\xdcG\xdf8_A\xacvH|\xe8\f0\xdd_\xe8\b\x00%v>\x12.\xd2\xd5J\xa0\xcd\xc1\xf0\x8b\xaa\xd0\x83)\xd3\xa7\x8a^S\xed\xa1\x83\xa5H\xf3\xba\x17C!\xc7GX\xa8\xc7u\r\x15ub\xfc\fU\x005^v\x8c\x1a\xcb\vi\x99\xe4el\xc4\xa7\xb8\x7f\x02\xd5\xe3$\xe3\x9d\x002\x96\x91\v.*\xa5I\xb0', 0x1) pwrite64(r2, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r2, 0x0) lseek(r1, 0x0, 0x1) sendfile(r2, r2, &(0x7f0000000440), 0x20) sendfile(r2, r2, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x9, 0x7f, 0xfff, 0x3, 0x0, 0x9, 0x80401, 0x8, 0x2, 0x801, 0x2, 0x0, 0x0, 0x1, 0x20, 0x4de, 0x7fff, 0x101, 0x1ff, 0x8, 0xc4, 0x9, 0x81, 0x8, 0x88f, 0xba5e, 0x6, 0x6, 0x1, 0x5, 0x1ff, 0x81, 0x7, 0x8, 0x7ff, 0x56, 0x0, 0xffffffff, 0x4, @perf_bp={&(0x7f0000000240), 0x2}, 0x1000, 0x3b3b, 0x8, 0x6, 0x1d9981b5, 0x8, 0x7}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0x1) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) getdents(r6, &(0x7f0000000100)=""/92, 0x54) getdents64(r6, &(0x7f0000000200)=""/191, 0xbf) write$char_usb(r6, &(0x7f0000000180)="0a5726aa7f43d1a654e91d645530ed94e9252a60", 0x14) write$UHID_CREATE2(r3, &(0x7f0000000a80)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000019000008394c6d59262cb61ff916829f820000000000000000004000000000dcea1523674e4fc200000000000000000000000000000000049dec26a8eb6f5a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a31000000000000000000362ad839b57fbecc00000000000000000000000000000000000000000000bff0e7c972e359a773bca600de00000000000000000000000000000032118300acc200b01dc63dfe97d900010400000081615271deb1a003a318d441d8ef0ba51947190a0bb05049ddb68644e3b64f21174d5afe551699d9c26de9edec7b4bae4b4fda8eaef1ce8d81da25fb9ca96d5e3fd0f47e906cf9778553a9341e9ee2a88f216bba214c5aea3b72f6988a15cffdc36009808c7c4ee3aa99097dc476067ef62c5d4cc612e3be0627edf3547297389fd6d3977aa1bb8100000000000000000000063887e2662ce8a60f81e1bc1dff064ecd04df4f063773e1f878fd338a2b813394731a2f2b5bb16d331876cc55fd49181ff33e79f42b014daa08ecb7b44dbb897ba998b987878064f146150ca6722b66990c998f847fbc7a8338f00c9268443f41784373c9690b53f641f2d6b5b2b249d2f0fbb91c1d3be4f2a0578fea66011fe78a22b8ce7e4a48421a742cc908189331efd9bb8fd889ff682634327c7d650e44d8ec18213cb4f7a4892c12fac30f156d61618a969bd4a93fc75ee1140fa66968336b3f00000000d190971440ffa5f20382fa38cde3b73e7cdaefc4ad041f26d75dca7a16e8cbd56908475ae02f6cffe7e16b796c538f7d8cc12e8b2a5d8ad45132e02c1156183ce92efc028cc8f510f58d0c49635ada4a82aa0046ab126f0fc9975636c4a9adeb895a73c582fbbc9b420ed7eabd1ffd76a9935a620d13f57ff981b79a0dcb819efb6b8876bfcd99720bf767ad6debe80eb57e87d304dc00"/760], 0x1) sendfile(r4, r5, 0x0, 0x8000) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) ioctl$KDGETLED(r5, 0x4b31, &(0x7f0000000000)) mkdir(0x0, 0x0) getpeername(r5, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000780)='TIPC\x00') ioctl$sock_SIOCDELDLCI(r4, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x1910824, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='pagemap\x00') fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)) 04:32:24 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:24 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:24 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() r4 = socket$inet(0x2, 0x3, 0xc4) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000000)={'n\xc7y\x00', 0x0, 0x0, 0x0, [], 0xfffffffffffffefa, 0x0, 0x0}, &(0x7f0000001280)=0x3d) ptrace$setopts(0x4206, r3, 0x0, 0x0) r5 = gettid() tkill(r5, 0x16) 04:32:24 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:24 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000600)='bpf\x00\xe4\x9b\x01z\x0e\x02\x1a\xf9\xb3X\x0f\x96\xe7\xdf\x0f&8\xd0\xba\xc1\x03B5t\xab\x1c\x94b\x8e\xfe\xb2b\xfcp2af\xb6\xc3vj^#\xff\xda<\xa4\xe9\x80\xb3\xc4\x1b\xf8\v\xf68\x0e\xba\x14q\xa4\xdb\xe6\xf3\x04\xc8m\x12\x82\xdeT\x9fe\xfc\xb2FY\xc7Z\xafJ\x13.-\x84EN\x97\x06E\btP\xd3\x9fag\x9c\x1e\x00\xa9C\xb7\xa47\x9f9\xc9\xa3\xc8\x83\x85*\x18\xd2\x0f\x04\x17r\x0e\xbc}\xefB:\xe2\x05\xb6T\x94\xa8\x87\x1c\n3tN\xe9\xbcP]\xc1\xa3,1\xc6\x0f\xfb2\xdcG\xdf8_A\xacvH|\xe8\f0\xdd_\xe8\b\x00%v>\x12.\xd2\xd5J\xa0\xcd\xc1\xf0\x8b\xaa\xd0\x83)\xd3\xa7\x8a^S\xed\xa1\x83\xa5H\xf3\xba\x17C!\xc7GX\xa8\xc7u\r\x15ub\xfc\fU\x005^v\x8c\x1a\xcb\vi\x99\xe4el\xc4\xa7\xb8\x7f\x02\xd5\xe3$\xe3\x9d\x002\x96\x91\v.*\xa5I\xb0', 0x1) pwrite64(r2, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r2, 0x0) lseek(r1, 0x0, 0x1) sendfile(r2, r2, &(0x7f0000000440), 0x20) sendfile(r2, r2, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x9, 0x7f, 0xfff, 0x3, 0x0, 0x9, 0x80401, 0x8, 0x2, 0x801, 0x2, 0x0, 0x0, 0x1, 0x20, 0x4de, 0x7fff, 0x101, 0x1ff, 0x8, 0xc4, 0x9, 0x81, 0x8, 0x88f, 0xba5e, 0x6, 0x6, 0x1, 0x5, 0x1ff, 0x81, 0x7, 0x8, 0x7ff, 0x56, 0x0, 0xffffffff, 0x4, @perf_bp={&(0x7f0000000240), 0x2}, 0x1000, 0x3b3b, 0x8, 0x6, 0x1d9981b5, 0x8, 0x7}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0x1) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) getdents(r6, &(0x7f0000000100)=""/92, 0x54) getdents64(r6, &(0x7f0000000200)=""/191, 0xbf) write$char_usb(r6, &(0x7f0000000180)="0a5726aa7f43d1a654e91d645530ed94e9252a60", 0x14) write$UHID_CREATE2(r3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"/760], 0x1) sendfile(r4, r5, 0x0, 0x8000) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) ioctl$KDGETLED(r5, 0x4b31, &(0x7f0000000000)) mkdir(0x0, 0x0) getpeername(r5, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000780)='TIPC\x00') ioctl$sock_SIOCDELDLCI(r4, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x1910824, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='pagemap\x00') fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)) [ 700.216813] IPVS: ftp: loaded support on port[0] = 21 04:32:24 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 700.729771] IPVS: ftp: loaded support on port[0] = 21 04:32:25 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:25 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000600)='bpf\x00\xe4\x9b\x01z\x0e\x02\x1a\xf9\xb3X\x0f\x96\xe7\xdf\x0f&8\xd0\xba\xc1\x03B5t\xab\x1c\x94b\x8e\xfe\xb2b\xfcp2af\xb6\xc3vj^#\xff\xda<\xa4\xe9\x80\xb3\xc4\x1b\xf8\v\xf68\x0e\xba\x14q\xa4\xdb\xe6\xf3\x04\xc8m\x12\x82\xdeT\x9fe\xfc\xb2FY\xc7Z\xafJ\x13.-\x84EN\x97\x06E\btP\xd3\x9fag\x9c\x1e\x00\xa9C\xb7\xa47\x9f9\xc9\xa3\xc8\x83\x85*\x18\xd2\x0f\x04\x17r\x0e\xbc}\xefB:\xe2\x05\xb6T\x94\xa8\x87\x1c\n3tN\xe9\xbcP]\xc1\xa3,1\xc6\x0f\xfb2\xdcG\xdf8_A\xacvH|\xe8\f0\xdd_\xe8\b\x00%v>\x12.\xd2\xd5J\xa0\xcd\xc1\xf0\x8b\xaa\xd0\x83)\xd3\xa7\x8a^S\xed\xa1\x83\xa5H\xf3\xba\x17C!\xc7GX\xa8\xc7u\r\x15ub\xfc\fU\x005^v\x8c\x1a\xcb\vi\x99\xe4el\xc4\xa7\xb8\x7f\x02\xd5\xe3$\xe3\x9d\x002\x96\x91\v.*\xa5I\xb0', 0x1) pwrite64(r2, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r2, 0x0) lseek(r1, 0x0, 0x1) sendfile(r2, r2, &(0x7f0000000440), 0x20) sendfile(r2, r2, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x9, 0x7f, 0xfff, 0x3, 0x0, 0x9, 0x80401, 0x8, 0x2, 0x801, 0x2, 0x0, 0x0, 0x1, 0x20, 0x4de, 0x7fff, 0x101, 0x1ff, 0x8, 0xc4, 0x9, 0x81, 0x8, 0x88f, 0xba5e, 0x6, 0x6, 0x1, 0x5, 0x1ff, 0x81, 0x7, 0x8, 0x7ff, 0x56, 0x0, 0xffffffff, 0x4, @perf_bp={&(0x7f0000000240), 0x2}, 0x1000, 0x3b3b, 0x8, 0x6, 0x1d9981b5, 0x8, 0x7}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0x1) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) getdents(r6, &(0x7f0000000100)=""/92, 0x54) getdents64(r6, &(0x7f0000000200)=""/191, 0xbf) write$char_usb(r6, &(0x7f0000000180)="0a5726aa7f43d1a654e91d645530ed94e9252a60", 0x14) write$UHID_CREATE2(r3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"/760], 0x1) sendfile(r4, r5, 0x0, 0x8000) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) ioctl$KDGETLED(r5, 0x4b31, &(0x7f0000000000)) mkdir(0x0, 0x0) getpeername(r5, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000780)='TIPC\x00') ioctl$sock_SIOCDELDLCI(r4, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x1910824, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='pagemap\x00') fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)) 04:32:25 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 700.944117] IPVS: ftp: loaded support on port[0] = 21 04:32:25 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:26 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d9e3a40f9", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:26 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000600)='bpf\x00\xe4\x9b\x01z\x0e\x02\x1a\xf9\xb3X\x0f\x96\xe7\xdf\x0f&8\xd0\xba\xc1\x03B5t\xab\x1c\x94b\x8e\xfe\xb2b\xfcp2af\xb6\xc3vj^#\xff\xda<\xa4\xe9\x80\xb3\xc4\x1b\xf8\v\xf68\x0e\xba\x14q\xa4\xdb\xe6\xf3\x04\xc8m\x12\x82\xdeT\x9fe\xfc\xb2FY\xc7Z\xafJ\x13.-\x84EN\x97\x06E\btP\xd3\x9fag\x9c\x1e\x00\xa9C\xb7\xa47\x9f9\xc9\xa3\xc8\x83\x85*\x18\xd2\x0f\x04\x17r\x0e\xbc}\xefB:\xe2\x05\xb6T\x94\xa8\x87\x1c\n3tN\xe9\xbcP]\xc1\xa3,1\xc6\x0f\xfb2\xdcG\xdf8_A\xacvH|\xe8\f0\xdd_\xe8\b\x00%v>\x12.\xd2\xd5J\xa0\xcd\xc1\xf0\x8b\xaa\xd0\x83)\xd3\xa7\x8a^S\xed\xa1\x83\xa5H\xf3\xba\x17C!\xc7GX\xa8\xc7u\r\x15ub\xfc\fU\x005^v\x8c\x1a\xcb\vi\x99\xe4el\xc4\xa7\xb8\x7f\x02\xd5\xe3$\xe3\x9d\x002\x96\x91\v.*\xa5I\xb0', 0x1) pwrite64(r2, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r2, 0x0) lseek(r1, 0x0, 0x1) sendfile(r2, r2, &(0x7f0000000440), 0x20) sendfile(r2, r2, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x9, 0x7f, 0xfff, 0x3, 0x0, 0x9, 0x80401, 0x8, 0x2, 0x801, 0x2, 0x0, 0x0, 0x1, 0x20, 0x4de, 0x7fff, 0x101, 0x1ff, 0x8, 0xc4, 0x9, 0x81, 0x8, 0x88f, 0xba5e, 0x6, 0x6, 0x1, 0x5, 0x1ff, 0x81, 0x7, 0x8, 0x7ff, 0x56, 0x0, 0xffffffff, 0x4, @perf_bp={&(0x7f0000000240), 0x2}, 0x1000, 0x3b3b, 0x8, 0x6, 0x1d9981b5, 0x8, 0x7}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0x1) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) getdents(r6, &(0x7f0000000100)=""/92, 0x54) getdents64(r6, &(0x7f0000000200)=""/191, 0xbf) write$char_usb(r6, &(0x7f0000000180)="0a5726aa7f43d1a654e91d645530ed94e9252a60", 0x14) write$UHID_CREATE2(r3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"/760], 0x1) sendfile(r4, r5, 0x0, 0x8000) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) ioctl$KDGETLED(r5, 0x4b31, &(0x7f0000000000)) mkdir(0x0, 0x0) getpeername(r5, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000780)='TIPC\x00') ioctl$sock_SIOCDELDLCI(r4, 0x8981, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x1910824, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='pagemap\x00') fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)) 04:32:26 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:26 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:27 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d9e3a", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:27 executing program 2: r0 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/create\x00', 0x2, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) 04:32:27 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d9e3a40f9", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:27 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r1, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r4) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300)={r2, 0x0, r4}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r5, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r5, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:27 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f00000002c0)=0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0xd0fc7775791e4b28, 0x70, 0x18, 0x40, 0x3, 0x0, 0x0, 0x9, 0x660c68c7bcd781bf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x17, 0x0, @perf_config_ext={0x9, 0x6}, 0x24201, 0x7, 0x7, 0x7, 0x8, 0x0, 0x7fff}, r4, 0x4, r7, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = gettid() r9 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$EBT_SO_GET_ENTRIES(r9, 0x0, 0x83, &(0x7f0000000140)={'n\xc7y\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0}, &(0x7f0000001280)=0x78) ptrace$setopts(0x4206, r8, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = fcntl$dupfd(r11, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = fcntl$dupfd(r14, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r15, 0xc0502100, &(0x7f0000000240)={0x0, 0x0}) ptrace$cont(0x20, r16, 0xa, 0xfffffffffffffffe) r17 = gettid() r18 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r18, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000300)=']}\xc1\xac\x00'}, 0x30) r19 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r18, r19, 0x0, 0x12, &(0x7f00000000c0)='securityGPL\\[user\x00'}, 0x30) tkill(r17, 0x16) 04:32:27 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) clock_gettime(0x0, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)) 04:32:27 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x20) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) getsockopt$TIPC_DEST_DROPPABLE(r2, 0x10f, 0x81, &(0x7f0000000080), &(0x7f00000000c0)=0x4) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x5bc5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f00000012c0)="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") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() r5 = socket$inet(0x2, 0x3, 0x20000000084) setxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='security.apparmor\x00', &(0x7f0000000180)='n\xc7y\x00', 0x4, 0x1) getsockopt$EBT_SO_GET_ENTRIES(r5, 0x0, 0x83, &(0x7f0000000000)={'n\xc7y\x00', 0x0, 0x0, 0x393, [], 0xfffffffffffffefa, 0x0, 0x0}, &(0x7f0000001280)=0x3d) ptrace$setopts(0x4206, r4, 0x0, 0x0) ioctl$VIDIOC_QUERYMENU(r2, 0xc02c5625, &(0x7f00000001c0)={0x0, 0x236, @name="f454556e75731707e1e2efd38611a176615f9962fdbf8cdfc28e332b444c06c3"}) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) r6 = gettid() r7 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r7, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000300)=']}\xc1\xac\x00'}, 0x30) prlimit64(r7, 0xe, &(0x7f0000000280)={0x8, 0x1000}, &(0x7f00000002c0)) tkill(r6, 0x16) 04:32:27 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2e2f66696c6530003d9b54dd9246409df087eef16c1d854de6a5a1f51dd322010e0406b902ba6ad46cd4a61b9442d551823c542bf649680c870b8acf9a8473eab5f9d4bd34e0d15044e353073db0639da12bb6586dd51585f5b05be38bbf89a3b2cf80ad60a1b3acdc36e6"], &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) r7 = fcntl$dupfd(r5, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$TIOCNOTTY(r7, 0x5422) r8 = socket(0x100001400000010, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = fcntl$dupfd(r12, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000100)={0x0, 0x0, r6}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r13, 0xc00c642e, &(0x7f0000000140)={r14, 0x80000, r7}) r15 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) ioctl$PPPIOCDISCONN(r15, 0x7439) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r18 = fcntl$dupfd(r17, 0x0, r16) ioctl$PERF_EVENT_IOC_ENABLE(r18, 0x8912, 0x400200) ioctl$LOOP_SET_DIRECT_IO(r18, 0x4c08, 0x5) write(r8, &(0x7f0000000080)="2400000052001f0014f97407010904000200071008000100010000000800800000000000", 0x54a) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r21 = fcntl$dupfd(r20, 0x0, r19) ioctl$PERF_EVENT_IOC_ENABLE(r21, 0x8912, 0x400200) r22 = fcntl$dupfd(r21, 0x406, r3) ioctl$EVIOCSKEYCODE(r22, 0x40084504, &(0x7f00000000c0)=[0x3b, 0x80000001]) 04:32:27 executing program 2: io_setup(0x7, &(0x7f0000000300)=0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x13) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) io_submit(r0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000040), 0xff66}]) [ 703.244865] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, 04:32:27 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000002c0)}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="13d50f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="d59e49ecefedf29f150f48fa7ec5cab66b559969cd332a5eeff075656d6b7d21bf145e62166c6b31cfef16b080776ad79c7e8683ac61d859a63668db03b6806e1b26df4787c75fc0388de8c24377fd0d27caaedc7fe84aa5720e631ec2d22f2e89e6ca403bc571aa6039de4795e200f35134cf25758a8b75"], 0x0, 0x78}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 703.332640] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, 04:32:27 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f00000000c0)='./file0\x00', 0x101000, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@ng={0x4, 0x3, "f9ee2880"}, 0x6, 0x3) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) r3 = socket(0x100001400000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="2400000052001f0014f97407010904000200071008000100010000000800800000000000", 0x54a) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f0000000380)={@un=@file={0x1, './file0\x00'}, {&(0x7f0000000240)=""/250, 0xfa}, &(0x7f0000000340), 0xa}, 0xa0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) 04:32:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000580)='net/ip6_tables_matches\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000180)=""/217, 0xd9}], 0x1, 0x20000000) [ 703.390826] ptrace attach of "/root/syz-executor.2"[19212] was attempted by "/root/syz-executor.2"[19213] [ 703.528262] IPVS: ftp: loaded support on port[0] = 21 04:32:28 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:28 executing program 2: 04:32:28 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x844c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)=ANY=[@ANYBLOB="03006d6d3030303030304430302c00"]) [ 703.943483] audit: type=1800 audit(1574224348.531:81): pid=19228 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.5" name="file0" dev="sda1" ino=17151 res=0 [ 703.968099] EXT4-fs (sda1): Unrecognized mount option "" or missing value [ 704.015109] audit: type=1400 audit(1574224348.601:82): avc: denied { getrlimit } for pid=19186 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=process permissive=1 04:32:28 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r1, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r4) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300)={r2, 0x0, r4}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r5, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r5, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:28 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:28 executing program 2: 04:32:30 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000080)=""/163) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() r4 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000000)={'n\xc7y\x00', 0x0, 0x0, 0x0, [], 0xfffffffffffffefa, 0x0, 0x0}, &(0x7f0000001280)=0x3d) ptrace$setopts(0x4206, r3, 0x0, 0x0) r5 = gettid() tkill(r5, 0x16) 04:32:30 executing program 2: 04:32:30 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000240)={0x81, 0xffffffffffffdcbd, 0x6}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r5, 0xc0a85322, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303030303030303030303010302c00"]) 04:32:30 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:30 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:30 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r1, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r4) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300)={r2, 0x0, r4}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r5, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r5, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:30 executing program 2: 04:32:30 executing program 2: [ 706.244860] EXT4-fs (sda1): Unrecognized mount option "commit=0x000000000000000" or missing value 04:32:30 executing program 2: 04:32:30 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) eventfd2(0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = eventfd2(0x0, 0x0) open(0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000640)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "52c947", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, 0x0) [ 706.320766] EXT4-fs (sda1): Unrecognized mount option "commit=0x000000000000000" or missing value 04:32:31 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x4, 0x400, 0x250, 0x128, 0x250, 0x128, 0x128, 0x368, 0x368, 0x368, 0x368, 0x368, 0x4, &(0x7f00000000c0), {[{{@uncond, 0x0, 0x100, 0x128, 0x0, {}, [@common=@ttl={0x28, 'ttl\x00', 0x0, {0x1, 0x62}}, @common=@set={0x40, 'set\x00', 0x0, {{0x0, [0x5, 0xf45ebb, 0x7, 0x1e1, 0x2, 0x8], 0x1, 0x20}}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ip={@local, @empty, 0xff000000, 0x0, 'rose0\x00', 'bpq0\x00', {}, {0xff}, 0x20d15923ad7736ea, 0x2, 0x30}, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x1, 0x6, 0x1}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@local, [0x0, 0xff000000, 0x0, 0xff], 0x4e20, 0x4e20, 0x4e24, 0x4e20, 0x8, 0x40, 0x5, 0x9, 0x7}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@ttl={0x28, 'ttl\x00', 0x0, {0x0, 0xc1}}, @common=@unspec=@mark={0x30, 'mark\x00', 0x1, {0x80000001, 0x2, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x6}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000100)=ANY=[@ANYBLOB="636f6d6d69743d30783030303030b299574a7c94d530303030303030303030302c00"]) 04:32:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000004c0), 0x400000000000251, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x1000000000004e24, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) [ 706.467427] IPVS: ftp: loaded support on port[0] = 21 [ 706.501109] EXT4-fs (sda1): Unrecognized mount option "commit=0x00000²™WJ|”Õ00000000000" or missing value [ 706.623157] EXT4-fs (sda1): Unrecognized mount option "commit=0x00000²™WJ|”Õ00000000000" or missing value [ 706.868777] IPVS: ftp: loaded support on port[0] = 21 04:32:33 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) fchmod(r2, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f0000000240)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) write$binfmt_script(r1, &(0x7f00000000c0)={'#! ', './file0', [{0x20, 'commit'}], 0xa, "94e2f6b22d9e24db0f925125f54eaccebf9916b6adce27c4c1fad35bd58d390cbe4e04c6326e2d51c5ac4ae7f53afc8b2b6a49fa2c6b8a669ef7f82b0ded8fd0075f68c61230d32651f0cec023b32c86c55fc893b532931aec92f04f8ca30e4c1c1d2bd2246765e5bfb795997fd2d706930f140303b2bc297c147d9951c3dd6488bf3fc0ff7a354c9d33853a99c3fd074436102077a4147a1f3e7d3456763b24"}, 0xb2) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) 04:32:33 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:33 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199783b0a82f79b32a7c8225086600a38e07d4db88a66596759e95307b680ab73e03d53555c97e8e37d01da4d44a994354a9fa3f355214eeabd24dd620b2022d5ad63b369aaffe900b608a5fece0eca95d71f2d3e6061", 0x66}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:32:33 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d9e3a40f9", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:33 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:33 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) dup2(r1, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x83, &(0x7f0000000000)={'n\xc7y\x00', 0x0, 0x0, 0x0, [], 0xfffffffffffffefa, 0x0, 0x0}, &(0x7f0000001280)=0x3d) ptrace$setopts(0x4206, r2, 0x0, 0x0) gettid() r4 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r4, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000300)=']}\xc1\xac\x00'}, 0x30) r5 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r5, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000300)=']}\xc1\xac\x00'}, 0x30) tkill(r5, 0x27) 04:32:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x4, 0x4, 0x101}, 0x13) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, 0x0, &(0x7f0000001400)=""/4106}, 0x20) 04:32:33 executing program 3: socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDDELIO(r2, 0x4b35, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() r4 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000000)={'n\xc7y\x00', 0x0, 0x0, 0x0, [], 0xfffffffffffffefa, 0x0, 0x0}, &(0x7f0000001280)=0x3d) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) accept4$rose(r7, &(0x7f0000000240)=@full={0xb, @dev, @bcast, 0x0, [@default, @null, @netrom, @remote, @remote, @default]}, &(0x7f0000000280)=0x40, 0x80c00) ptrace$setopts(0x4206, r3, 0x0, 0x0) r8 = gettid() tkill(r8, 0x16) r9 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x201000, 0x0) r10 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000100)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r9, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x54205}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r10, 0x2, 0x70bd29, 0x25dfdbfe, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x2daa6b9d94bee5a7) [ 709.281196] ptrace attach of "/root/syz-executor.2"[19329] was attempted by "/root/syz-executor.2"[19331] [ 709.299873] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, [ 709.355215] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, 04:32:34 executing program 2: open(0x0, 0x8001141042, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000}, 0x1c) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpu.stat\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x62a, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) lstat(0x0, 0x0) socket$inet6(0xa, 0x49c68e0740a3058b, 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@multicast1, @in=@remote, 0x4e20, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x33}, {0x3fde27fc, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2000000000004, 0x1}, {0x0, 0x3}, 0x0, 0x6e6bb8, 0x0, 0x1, 0x2, 0x3}, {{@in=@dev, 0x4d5, 0x3c}, 0xa, @in6=@mcast1, 0x0, 0x8476f732d1874694, 0x0, 0xb8, 0x3}}, 0xe8) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x807f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200}, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x2000) fchdir(r2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000680)={{{@in6=@remote, @in=@broadcast, 0x0, 0x8, 0x4e22, 0x0, 0x2, 0xf0, 0xb0, 0x16}, {0x58d, 0x47, 0x2, 0xfff, 0x0, 0x7, 0x0, 0x80000001}, {0x9, 0x0, 0x7, 0x6}, 0x40, 0x0, 0x1}, {{@in=@multicast2, 0x4d3, 0x6c}, 0xa, @in6=@rand_addr="9e40e95d5e7fc44fdd448161f5191245", 0x0, 0x2, 0x3, 0x40, 0x0, 0x0, 0x8}}, 0xe8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) 04:32:34 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x7, 0x322000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TUNSETVNETBE(r5, 0x400454de, &(0x7f0000000100)=0x1) [ 709.557264] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, [ 709.603144] IPVS: ftp: loaded support on port[0] = 21 04:32:34 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_mreqsrc(r2, 0x0, 0x47, &(0x7f0000000080)={@remote, @multicast1}, &(0x7f0000000100)=0xc) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xfffffffffffffe2e, 0x0, 0x10, &(0x7f0000000140)=ANY=[@ANYBLOB="2c6e6f6c617a79746901802c00"/25]) 04:32:34 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r5, 0x10f, 0x7f, &(0x7f0000000040), &(0x7f0000000100)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) r6 = socket(0x100001400000010, 0x2, 0x0) write(r6, &(0x7f0000000080)="2400000052001f0014f97407010904000200071008000100010000000800800000000000", 0x54a) setsockopt$sock_int(r6, 0x1, 0x1e, &(0x7f0000000140)=0x9, 0x4) mount(&(0x7f0000000040)=ANY=[], &(0x7f00000000c0)='./file0\x00', 0x0, 0x10000, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) 04:32:34 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:34 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccb"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:34 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) io_submit(0x0, 0x1, &(0x7f0000000180)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x8, r3, &(0x7f0000000240)="0c608045e73bd16188c436fd86d9ab778842af9541f49de4e465d7b3d3812732c42f7b297f5d57ffaeb8015afcfa6b3d79db26a8fccef2d4b6ac29f1bde89707945f5025ea2b4a44dc819225fb0d131ba911b5a53756516ba0c7859a873736cb366024f9ebaffef0b4bb49f88af59a5f7abd32ce14048b7bf9c8d3fd012b668c43ca93508b4e5902fcb5286cdd248f5197ffda032bb06ad8977a794b3c2d472c3b5e0e8eadce5850fd81389651c2dce5e500c366863ce823846145a62c238ef2f3a1e58d3fad7e56f4277c4fba6f3278de06ff7525635cfa9ae7bc9c382409ac15a69594f084a697b4e35dfe033fe3bcb905544ff2ac34cd9c3a", 0xfa, 0x0, 0x0, 0x0, r2}]) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000140)=@nullb='/dev/nullb0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x19a1054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'c?\x00\x00\x04t'}}]}) [ 710.356338] tmpfs: No value for mount option 'c?' 04:32:35 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) fchmod(r2, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f0000000240)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) write$binfmt_script(r1, &(0x7f00000000c0)={'#! ', './file0', [{0x20, 'commit'}], 0xa, "94e2f6b22d9e24db0f925125f54eaccebf9916b6adce27c4c1fad35bd58d390cbe4e04c6326e2d51c5ac4ae7f53afc8b2b6a49fa2c6b8a669ef7f82b0ded8fd0075f68c61230d32651f0cec023b32c86c55fc893b532931aec92f04f8ca30e4c1c1d2bd2246765e5bfb795997fd2d706930f140303b2bc297c147d9951c3dd6488bf3fc0ff7a354c9d33853a99c3fd074436102077a4147a1f3e7d3456763b24"}, 0xb2) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) 04:32:35 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:35 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2310049, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$NS_GET_OWNER_UID(r5, 0xb704, &(0x7f0000000400)=0x0) syz_mount_image$hfs(&(0x7f0000000100)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x2, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000340)="7c5f40454747f8824e39af567432b7266de61566c43f1c283266bd382ae96796cab5a23b93d5dc613002126bc60bdb67bfc9038b47e93038ff0d5741d063483d24f4e0581c9b20a6165b92ff87963d55c6d8865b1f877b438406bb11d242816034", 0x61, 0x6}], 0xa28800, &(0x7f0000000440)={[{@part={'part', 0x3d, 0x2}}, {@type={'type', 0x3d, "fe4e6cc0"}}, {@part={'part', 0x3d, 0x364}}, {@codepage={'codepage', 0x3d, 'iso8859-2'}}, {@codepage={'codepage', 0x3d, 'cp950'}}, {@dir_umask={'dir_umask', 0x3d, 0xfffffffffffffc1e}}], [{@fowner_gt={'fowner>', r6}}, {@fsname={'fsname', 0x3d, '/selinux/avc/cache_threshold\x00'}}, {@subj_type={'subj_type', 0x3d, 'eth1em1'}}]}) r7 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$EVIOCGID(r7, 0x80084502, &(0x7f0000000240)=""/232) ioctl$CAPI_NCCI_OPENCOUNT(0xffffffffffffffff, 0x80044326, &(0x7f0000000540)=0x9) 04:32:35 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) fchmod(r2, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f0000000240)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) write$binfmt_script(r1, &(0x7f00000000c0)={'#! ', './file0', [{0x20, 'commit'}], 0xa, "94e2f6b22d9e24db0f925125f54eaccebf9916b6adce27c4c1fad35bd58d390cbe4e04c6326e2d51c5ac4ae7f53afc8b2b6a49fa2c6b8a669ef7f82b0ded8fd0075f68c61230d32651f0cec023b32c86c55fc893b532931aec92f04f8ca30e4c1c1d2bd2246765e5bfb795997fd2d706930f140303b2bc297c147d9951c3dd6488bf3fc0ff7a354c9d33853a99c3fd074436102077a4147a1f3e7d3456763b24"}, 0xb2) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) 04:32:36 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x100001400000010, 0x2, 0x0) write(r1, &(0x7f0000000080)="2400000052001f0014f97407010904000200071008000100010000000800800000000000", 0x54a) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) r4 = fcntl$dupfd(r0, 0x406, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_GET_SECUREBITS(0x1b) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) 04:32:36 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) fchmod(r2, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f0000000240)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) write$binfmt_script(r1, &(0x7f00000000c0)={'#! ', './file0', [{0x20, 'commit'}], 0xa, "94e2f6b22d9e24db0f925125f54eaccebf9916b6adce27c4c1fad35bd58d390cbe4e04c6326e2d51c5ac4ae7f53afc8b2b6a49fa2c6b8a669ef7f82b0ded8fd0075f68c61230d32651f0cec023b32c86c55fc893b532931aec92f04f8ca30e4c1c1d2bd2246765e5bfb795997fd2d706930f140303b2bc297c147d9951c3dd6488bf3fc0ff7a354c9d33853a99c3fd074436102077a4147a1f3e7d3456763b24"}, 0xb2) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) 04:32:36 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d9e3a40f9", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccb"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:36 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:36 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:37 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 712.469583] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, 04:32:37 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r3 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r3, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000300)=']}\xc1\xac\x00'}, 0x30) move_pages(r3, 0x5, &(0x7f0000000080)=[&(0x7f0000ff8000/0x8000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff8000/0x3000)=nil], &(0x7f00000000c0)=[0x1ff, 0x1], &(0x7f0000000100)=[0x0], 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_MOD(r6, 0x3, r1, &(0x7f0000000580)={0x10000000}) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ptrace$setsig(0x4203, r3, 0x7, &(0x7f0000000140)={0x37, 0x6, 0x1fa3e966}) r7 = gettid() r8 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$EBT_SO_GET_ENTRIES(r8, 0x0, 0x83, &(0x7f0000000000)={'n\xc7y\x00', 0x0, 0x3, 0x0, [], 0x0, 0x0, 0x0}, &(0x7f0000001280)=0x78) ptrace$setopts(0x4206, r7, 0x0, 0x0) r9 = shmget$private(0x0, 0x1000, 0x200, &(0x7f0000ffc000/0x1000)=nil) shmctl$SHM_LOCK(r9, 0xb) r10 = socket(0x100001400000010, 0x2, 0x0) write(r10, &(0x7f0000000080)="2400000052001f0014f97407010904000200071008000100010000000800800000000000", 0x54a) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = fcntl$dupfd(r12, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xfffffffffffffd86) socket(0x8, 0x3, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000300", @ANYRES32, @ANYBLOB="08002f00d849c872cfb25253b74430a6d04b3d22e0b16187ae6205a54dfe1275e5b55565e28536c8ea5380dd41bd41e86240d4db9ac619af331b61033a30b898885428f7170639ac30e2f4b4877f79dc79370a", @ANYRES32=0x0, @ANYBLOB="0800000029a31eed659bc5991890a4bdebd7c181062589bd94bc1e17f668226c66955185673f25311923882f37f3a0aa7b98e414647e58b565f2386bd0fcdf836bb11602b6ebfe37e25cfdaaf38632b4ae8e22641ac6a549c422b200"/116, @ANYRES32, @ANYBLOB="10000600000000002000000000000000"], 0x3c, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = fcntl$dupfd(r16, 0x0, r15) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r17, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000340)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)={0x0, 0x0}) shmctl$IPC_SET(r9, 0x1, &(0x7f0000000500)={{0x50006ff1, r14, 0x0, r18, 0xee01, 0x6c, 0x4}, 0x7, 0xfffffffffffffffe, 0x200, 0xffffffffffffffe0, r19}) r20 = gettid() tkill(r20, 0x16) [ 712.562046] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, 04:32:37 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/avc/cache_stats\x00', 0x0, 0x0) sendto$inet(r2, &(0x7f00000004c0)="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", 0x1000, 0x24008140, &(0x7f0000000440)={0x2, 0x4e20, @loopback}, 0x10) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="ae2f665c8324a1a4"], &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r5 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r5, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000300)=']}\xc1\xac\x00'}, 0x30) write$FUSE_LK(0xffffffffffffffff, &(0x7f00000014c0)={0x28, 0xfffffffffffffffe, 0x8, {{0x0, 0x1, 0x1, r5}}}, 0x28) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000480)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r6}}, 0x20) r7 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, r7) keyctl$clear(0x7, r7) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000240)={0x8, 0x120, 0xfa00, {0x2, {0x8, 0x7, "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", 0xc5, 0xf4, 0x20, 0x81, 0x4, 0x1, 0x20}, r6}}, 0x128) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000380)=ANY=[@ANYBLOB="636f6d6d69743d307830303030303430303130ceaf813344165a47f71efff5855f7fc84185028d419cfc083d0f0000b0f405000000e25670dff34ad5c55e11b55774cb4a085b8381912d3cbdfb"]) 04:32:37 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r5, 0x110, 0x5, &(0x7f0000000100)=[0x1], 0x2) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2004049, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) [ 712.851758] IPVS: ftp: loaded support on port[0] = 21 04:32:37 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) execveat(r3, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=[&(0x7f0000000100)='GPL.-&posix_acl_access\x00'], &(0x7f0000000280)=[&(0x7f0000000240)='commit'], 0x1000) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) [ 713.127189] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, 04:32:37 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccb"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:37 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 713.198059] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, 04:32:37 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$cgroup_ro(r5, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(r6, 0x4b40, &(0x7f0000000100)=""/18) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000140)={0x2, 0x7fffffff, 0xffffffff, 0x7, 0x10, 0x8}) 04:32:37 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:38 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d9e3a40f9", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 713.528042] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, 04:32:38 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet6(0xa, 0x802, 0x96) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2000400, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) [ 713.570664] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, 04:32:38 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:38 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:40 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) epoll_create1(0x80000) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() r4 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000000)={'n\xc7y\x00', 0x0, 0x0, 0x0, [], 0xfffffffffffffefa, 0x0, 0x0}, &(0x7f0000001280)=0x3d) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000600)=@filter={'filter\x00', 0xe, 0x3, 0x51a, [0x0, 0x200000c0, 0x200000f0, 0x200003ac], 0x0, &(0x7f0000000080), &(0x7f00000000c0)=ANY=[@ANYBLOB="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"/1306]}, 0x592) ptrace$setopts(0x4206, r3, 0x0, 0x0) r5 = gettid() tkill(r5, 0x16) 04:32:40 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(0xffffffffffffffff, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:40 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SIOCSIFMTU(r5, 0x8922, &(0x7f00000000c0)={'veth1_to_bond\x00', 0xc0}) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) 04:32:40 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:40 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:40 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 715.647545] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, 04:32:40 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f00000000c0)={0x8001, 0x5, 0x1, 0x6, 0x75e, 0x4}) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) [ 715.745355] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, [ 715.798242] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, 04:32:40 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0x407, 0x32100) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x80000, 0x0) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000100)=@gcm_128={{0x304}, "d230933fa66f0963", "8edc4bae4f63af31a0e4b92d8690bde9", "57eed203", "d37a372fe55ada37"}, 0x28) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_TRANSLATE(r4, 0xc018ae85, &(0x7f0000000140)={0x2000, 0x5000, 0x2, 0x9, 0x7}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$KDADDIO(r7, 0x4b34, 0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r10, 0x810c5701, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = fcntl$dupfd(r12, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r15, 0x0, r14) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r15, 0xc0406618, &(0x7f0000000480)={{0x2, 0x0, @identifier="a7000000f7ffe7f8f0e54c67cd2c00"}}) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) r16 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0xe400, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r16, 0x40605346, &(0x7f0000000400)={0xcf, 0x2, {0x2, 0x3, 0x80000000, 0x3, 0x8}}) 04:32:40 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f00000000c0)='./file0\x00', 0x101c2, 0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCGETX(0xffffffffffffffff, 0x5432, &(0x7f0000000080)) syz_mount_image$bfs(&(0x7f0000000100)='bfs\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x5, &(0x7f0000001540)=[{&(0x7f0000000300)="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", 0x1000, 0x1}, {&(0x7f0000001300)="c04ff2a1f7cbb87b1fd7f637b11bbb6e70db330dc5479fecf873f27b8250feab7ff61643245d0e5cdb626134a2b76caee65ebd892250f890c67f393c60c939303e560543cdd300292ff3abd0146ec1a1e18fc54c54ec82e7", 0x58, 0x362}, {&(0x7f0000001380)="0d8821a12a0e8e99418868881abfdbb45dee3d6f9068649594818913514602b100eba296448a1c2f8480c5435c6f0f325623c7bc00ed6286a09dbd86caba5002298fa980", 0x44, 0x8}, {&(0x7f0000001400)="4f0348f94f52be9bf5aba3290735e5d2d4b46ae037522c122541c99801f09a3fcb70aaaa72d23a5ff6aee453e3a0747b643aaacd08533ce833792293f724e2b85e2fb214667d0da4434ecde60c9dc093e97722df23e17e1017d1040dfe84a3f8499b9f8dfa219b79a369253eed1915ba93bfcae56c985d71e7e35d72e41cd55b47b3e4c6266889f05da19b57f3156c22b39188", 0x93, 0x4}, {&(0x7f00000014c0)="8157343a7a7dedfa1cf9cce59e213b6ef0b5bf6140636c234f4436035f3d5d9e0a797f290c5d978733b71f8c1a01a1d4854e466dd7c14334df575630673f41bb84241863dd945b0e3ffd7ca72aa7f1fcd8b196127d137cf957dd3259a1382ca046112cd8ab7f7c1f91103025be92d2789d87", 0x72, 0x80}], 0x800000, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f0000000000)=@v1={0x0, @adiantum, 0x0, "83f8c813442409ed"}) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="0000000016000091"], &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) ioctl$KVM_SET_PIT(r5, 0x8048ae66, &(0x7f0000000240)={[{0xf32, 0x8ddb, 0x6, 0x81, 0xff, 0x7f, 0xe3, 0x9, 0x1, 0x9, 0x3f, 0xea, 0xffffffff7fffffff}, {0x0, 0x2a24, 0x80, 0xfe, 0x5, 0x8, 0xff, 0x61, 0x0, 0x7, 0x7, 0xff, 0x4}, {0x5, 0x8, 0x4, 0xb3, 0x8, 0x20, 0x1f, 0x3, 0x0, 0x3f, 0x9, 0x43}], 0x400}) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000140)={[{@commit={'co\xc2\x05\x00'}}]}) [ 715.972386] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, [ 716.085646] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=74669800) [ 716.201720] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=74669800) 04:32:40 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_QBUF(r5, 0xc058560f, &(0x7f0000000100)={0xffff, 0x7, 0x4, 0x0, {}, {0x0, 0x5f8dcf5aca663891, 0x7f, 0x6, 0x4, 0xc7, "00f1a2f7"}, 0x4, 0x4, @planes=&(0x7f00000000c0)={0x2, 0x3, @fd=0xffffffffffffffff, 0x401}, 0x4}) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000240)=0x20002000) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="843700006c6530009df0be2a5f217824d8807a378c5bd734423ba12174d5b75e6c57f2639fffde2c651a266eab75078daa80af"], &(0x7f0000000180)='./file0\x00', 0x0, 0x19c1054, 0x0) r7 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000080)=0xc74) setreuid(0x0, r8) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) r10 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r11) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000500)={[{@commit}], [{@euid_gt={'euid>', r8}}, {@context={'context', 0x3d, 'user_u'}}, {@fowner_gt={'fowner>', r11}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@euid_gt={'euid>', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'commit'}}, {@uid_eq={'uid', 0x3d, r9}}, {@permit_directio='permit_directio'}, {@dont_measure='dont_measure'}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}]}) 04:32:41 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:41 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(0xffffffffffffffff, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d9e3a40f9", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 716.795385] IPVS: ftp: loaded support on port[0] = 21 [ 717.141397] IPVS: ftp: loaded support on port[0] = 21 04:32:43 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() r4 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000000)={'n\xc7y\x00', 0x0, 0x0, 0x0, [], 0xfffffffffffffefa, 0x0, 0x0}, &(0x7f0000001280)=0x3d) ptrace$setopts(0x4206, r3, 0x0, 0x0) r5 = gettid() tkill(r5, 0x16) socket$inet(0x2, 0x2, 0x22) 04:32:43 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:43 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000240)={0xf, 0x8, 0xfa00, {r5, 0x5}}, 0x10) r6 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2f6465762f6e756c6c623000c78bfa26f3bd0a643474f574337c8de29bbadc97a32a44b5d16e6789595e36c3bfb826be6d8beea5f67a51fc3c02f103aa2f98b824d52766d57e989a92d2ce7bd1a575bdddd1ecce5f43020cf1f4119200a3c41fda5a9ef3769e7361deb53bab6bd157b4f950afd5eabc"], &(0x7f0000000180)='./file0\x00', 0x0, 0x1981050, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) 04:32:43 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:43 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:43 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(0xffffffffffffffff, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 718.669174] tmpfs: Bad mount option commit [ 718.741791] tmpfs: Bad mount option commit 04:32:43 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_GET_REGS(r5, 0x8090ae81, &(0x7f0000000240)) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r6, 0x84, 0x72, &(0x7f0000000040)={r7}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000100)={r7, 0x800}, &(0x7f0000000140)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0x2, 0xffffffff}}, 0x30) [ 718.902828] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, 04:32:44 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:44 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d9e3a40f9", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:44 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d9e3a40f9", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:44 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d9e3a40f9", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 719.616056] IPVS: ftp: loaded support on port[0] = 21 04:32:44 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 719.669663] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, [ 719.833600] IPVS: ftp: loaded support on port[0] = 21 [ 719.935213] IPVS: ftp: loaded support on port[0] = 21 [ 720.031488] IPVS: ftp: loaded support on port[0] = 21 04:32:46 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:46 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x105000, 0x0) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000100)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) open(&(0x7f0000000300)='./file0\x00', 0x2040c2, 0x233f97d22d97b7ed) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) r7 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCDELDLCI(r7, 0x8981, &(0x7f0000000240)={'rose0\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r8 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x2) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r8, 0x6, 0x70, 0x3, 0x6a000}) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)=ANY=[@ANYBLOB='commit=0x0000000000000000(\x00']) 04:32:46 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:46 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d9e3a40f9", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:46 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d9e3a40f9", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:46 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() r4 = socket$inet(0x2, 0x3, 0x20000000084) r5 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r5, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000300)=']}\xc1\xac\x00'}, 0x30) ptrace$getsig(0x4202, r5, 0x6, &(0x7f0000000080)) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000000)={'n\xc7y\x00', 0x0, 0x0, 0x0, [], 0xfffffffffffffefa, 0x0, 0x0}, &(0x7f0000001280)=0x3d) ptrace$setopts(0x4206, r3, 0x0, 0x0) r6 = gettid() tkill(r6, 0x16) ioctl$VIDIOC_ENUMAUDIO(r2, 0xc0345641, &(0x7f0000000100)={0x6, "f02cc4e05b6441fa912d32a181c67a382682293bde6eaae9facaf8eb0ce52dbc", 0x1, 0x1}) utimensat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={{0x77359400}}, 0x100) 04:32:46 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) [ 721.868905] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, 04:32:46 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TIOCSSERIAL(r4, 0x541f, &(0x7f0000000100)={0xacda, 0x8, 0x2, 0x10001, 0x8, 0x9, 0x6c, 0x8, 0x16d, 0x35, 0x72, 0x7ff, 0x8620, 0x1e7, &(0x7f0000000080)=""/48, 0x9}) r5 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000240)=@sr0='/dev/sr0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f00000000c0)=ANY=[@ANYBLOB="636f6d6d69743db078303030303030303030303030303030302c00a08f755729c09db3f692beeb51607c6757f1"]) [ 721.922239] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, 04:32:46 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f00000000c0)={[{@commit={'commit'}}], [{@dont_measure='dont_measure'}, {@dont_appraise='dont_appraise'}]}) 04:32:46 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) [ 722.054964] EXT4-fs (sda1): Unrecognized mount option "dont_measure" or missing value 04:32:46 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000d00)={0x0, 0x0}) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{0x8, 0x3, r10}, {}, {0x8, 0x0, r10}], {0x10, 0x6}}, 0x3c, 0x0) r11 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{0x8, 0x3, r12}, {}, {0x8, 0x0, r12}], {0x10, 0x6}}, 0x3c, 0x0) r13 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000300", @ANYRES32=r14, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="090000402b8e1f5b6054370a988da6da3430a836", @ANYRES32=r14, @ANYBLOB="10000600000000002000000000000000"], 0x3c, 0x0) getgroups(0x9, &(0x7f00000007c0)=[r10, 0xee01, 0xee01, r12, 0x0, 0xee01, 0xffffffffffffffff, r14, 0xee00]) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r18 = fcntl$dupfd(r17, 0x0, r16) ioctl$PERF_EVENT_IOC_ENABLE(r18, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r20, 0x0, r19) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r23 = fcntl$dupfd(r22, 0x0, r21) ioctl$PERF_EVENT_IOC_ENABLE(r23, 0x8912, 0x400200) ioctl$NS_GET_OWNER_UID(r23, 0xb704, &(0x7f0000000780)=0x0) getresgid(&(0x7f0000000b40), &(0x7f0000000880)=0x0, &(0x7f0000000bc0)) r26 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r26, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000300)=']}\xc1\xac\x00'}, 0x30) r27 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r27, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r28) r29 = getgid() r30 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000940)={0x4, &(0x7f0000000900)=[{0x1, 0x1f, 0x7, 0x9}, {0x89, 0xf6, 0x1f}, {0x800, 0x20, 0x6, 0xff}, {0x1000, 0x6, 0x3, 0xf93}]}) r31 = socket(0x100001400000010, 0x2, 0x0) write(r31, &(0x7f0000000080)="2400000052001f0014f97407010904000200071008000100010000000800800000000000", 0x54a) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r33, 0x0, r32) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r36 = fcntl$dupfd(r35, 0x0, r34) ioctl$PERF_EVENT_IOC_ENABLE(r36, 0x8912, 0x400200) sendmsg$unix(r4, &(0x7f0000000a40)={&(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000600)=[{&(0x7f0000000140)="b3b6d33d2c83cea0a2d0fbbb5fad35eb12b099ebc49545fc3adff47e7669399d5be85ca4fcd11827f2e865fb3911e5a770", 0x31}, {&(0x7f0000000240)="47f598069c76d7716e8a96d674acf8be11b98d56124c23e46aaf50ccef7b3b6870c2990b192db82ea568d82e9f27378df254182a1e1956e3534206bba4364eabb60b1bc7157a4d5796eb4c6579dc56d983dd5a03d48e39fc424ba9c995cc05226fb4262170dee7100e30a0dcd734a953da3bba20a6906c1ba3e5c4f3e628865d8270e7bda409cac76790b8c92fe6f7ebc2467fd5110bb294ae56cef9166602a2f4a5d7eb9015aeeee0b0a5e4585553b1b21533a3fd105a7baf738ecc5aaa717c0eff2e44641695197030eb169e5e7c0eacf7940572895cf052c23145d9611c873ef3", 0xe2}, {&(0x7f0000000340)="25938cc98cf97172868c0ad2549f7a031d24f80626c79dbe92c38d5bb17c175b977f49f5735c4ae4e4c99e76958a80a7d10f46b207ae74cd219f501a630cbd5472fbc31b769d46b7ee7176373875e01cdf7d6416fa6531ee2a70cc9b8dcd17380b41ed88b6de7e3db96d79b86a9802e777eba96328720149fdf683a7b9ca83f68c6da9bcd9acbd74c296501b51265e01efce936490345cefc3065ed44b03a3e56acd6f7bd059d11f75aa16d54512384d6b1cf3df182d1c60062f40a25ed2a42c15e991de03ea9667e0a63f6ae025da8db09924b8e1add7f747ee7d6c4669fc0c5c8e35a4607e61", 0xe7}, {&(0x7f0000000440)="6b933c11636e0334c21924ba83f4c417671189672de71392b9ed23140ba2429c6a0b702338e4545da8368ccf53f50dbcfb13348bc5c0c9f4afbc0869482b16d1326a10853a84114e6585c3c332e25ff2e0d467e6b89cd2e0e2e40e39612ba05fcbd4e904ae8e502d5a715161b0f650da360b7d35b0c0105df3cd5098c11a4bcf6c9eb4b4c0ff9d077aff6e5d4ed6489cb56e50703578bee85933fafee7ad42bc073c350fdcd01970d7580ca59b38b02a0613b45c3f8bb9", 0xb7}, {&(0x7f0000000500)="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", 0xfc}], 0x5, &(0x7f0000000980)=[@cred={{0x1c, 0x1, 0x2, {r7, r8, r15}}}, @rights={{0x1c, 0x1, 0x1, [r18, r20, r1]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r24, r25}}}, @cred={{0x1c, 0x1, 0x2, {r26, r28, r29}}}, @rights={{0x34, 0x1, 0x1, [r3, r30, 0xffffffffffffffff, r3, 0xffffffffffffffff, r32, r36, 0xffffffffffffffff, r1]}}], 0xb8, 0x40}, 0x4000004) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) 04:32:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) [ 722.329215] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, [ 722.378133] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, 04:32:47 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:47 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r3) vmsplice(r4, &(0x7f0000000440)=[{&(0x7f00000000c0)="d54d8a56d2172a3e71cebea34055940ba979ee3fa2ee1d3185c11be30afa84d622139e98697e43bd34451da14337555422bd95a234b875da1fc0850eae928d10f17010589d56b85215497deece81a82e81ac1c058d178dceda952e0c9492ba103b311e548393e04fc44f720f17a72027bed0489c6804d8", 0x77}, {&(0x7f0000000240)="f95a880a1bda364800ffcbe39474a7262c710ec0a9c78fbd071c9ade448a8ec6552aba6deeb489a6dfa49c29ac03e3555941d04cb85fcec2f9cded35619f5db13bdfd3bb1cf7ccd57ea0253403e1c1aa323bc2ebc1198a7b64688dacdb3bb625dc95e1603e42a31f762e36881f68de", 0x6f}, {&(0x7f0000000140)}, {&(0x7f00000002c0)="7069870f1c5027e26e24d72c6b814d7a7f8c8f13b4333051b89cde4b7ffec7122b2db26dcee57dc2cec2b1a5ada789c1dfda739469ec9c16eee01d2873d9432d9c8a741c9887e0caee165206fe8ca649a54b288c0b198f49dc342b9344436b75274423f8a34b5e3b1c4c47834e371f115cced3e2cf700af6cd58d771c2f2fb3718291397b741ffe509ec33da97fcdaee1904702d4a4e62a1e79ef79f86cc35cd99dfbc", 0xa3}, {&(0x7f0000000380)="e394d773d08da3d8ee3c3b70e82c3f2752a44e635cacf980adb3a0c81b9e4b73b2ed2f0c56bdbbbb7d50e99b43d900d063fe49cd6eec81c0a58d7435eeb23ab58150e964053809f3220d867601eaffe994ca9d4e52b6dec6ef7ce42c153def86c5510e57248a0341799839ddf503a680777d4c4a208e9e112769277a3e82632e52ab7f00b6", 0x85}], 0x5, 0xc) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) 04:32:47 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:47 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:47 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d9e3a40f9", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 722.569477] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, [ 722.629640] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, 04:32:49 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0xffffffffffffffff, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r3, 0x0) setresgid(0x0, r1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = gettid() r8 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$EBT_SO_GET_ENTRIES(r8, 0x0, 0x83, &(0x7f0000000000)={'n\xc7y\x00', 0x0, 0x0, 0x0, [], 0xfffffffffffffefa, 0x0, 0x0}, &(0x7f0000001280)=0x3d) ptrace$setopts(0x4206, r7, 0x0, 0x0) r9 = gettid() tkill(r9, 0x16) 04:32:49 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$RTC_AIE_OFF(r5, 0x7002) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000100)=ANY=[@ANYBLOB="636f6d543d30782f303030303030260b2f2f30303030302c0000004f00000080000000005a74dcecacd1bc0a99dcaccb864b0d9887abe9d8439b0ca81029e74f93220dadc0e449f6d7fa05000000bbcea7911fea0000"]) 04:32:49 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:49 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d9e3a40f9", @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x2}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:49 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:49 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 724.775799] EXT4-fs (sda1): Unrecognized mount option "comT=0x/000000& //00000" or missing value 04:32:49 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = socket(0x100001400000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="2400000052001f0014f97407010904000200071008000100010000000800800000000000", 0x54a) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r3) r5 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) r6 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video1\x00', 0x2, 0x0) fadvise64(r6, 0x6e, 0x2000000, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) [ 724.975886] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, 04:32:49 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = syz_genetlink_get_family_id$team(&(0x7f0000001300)='team\x00') r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x31}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r7}]]}}}]}, 0x40}}, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000001340)={0x0, @multicast2, @local}, &(0x7f0000001380)=0xc) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000013c0)={0x0, @multicast1, @dev}, &(0x7f0000001400)=0xc) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x31}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r12}]]}}}]}, 0x40}}, 0x0) r13 = socket(0x100001400000010, 0x2, 0x0) write(r13, &(0x7f0000000080)="2400000052001f0014f97407010904000200071008000100010000000800800000000000", 0x54a) getsockopt$inet_pktinfo(r13, 0x0, 0x8, &(0x7f0000001440)={0x0, @remote, @dev}, &(0x7f0000001480)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000014c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001500)=0x14, 0x800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r17, 0x0, r16) ioctl$sock_SIOCGIFINDEX(r16, 0x8933, &(0x7f0000001540)={'ip6gretap0\x00', 0x0}) r19 = socket$netlink(0x10, 0x3, 0x0) r20 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r20, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r20, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r19, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001a80)=ANY=[@ANYBLOB="4000000010000507000000000000000000000000b413b631946faa7c8b338e5204bc4dc240c53c63096531a6270a63b16f3aeff615bec7ce61cdf23b23d16ec0a2c722c3b8c6564b752c715deff4f62684c479ed4a5d00aa19005acaafaa7b912796e7c220000000ddcb3ee18164bfdef5fffb74a8dfe75dd418fd3e4c2a106708ef3a7787535fce38077bfdd0b64cc03f9846a70f39104027ea1b", @ANYRES32=0x0, @ANYBLOB="000000000000000020000200080008e330000000080002000000000000000000000000808d06c787a3e0a65ed61082e3d986da60c52351eb5732512c49", @ANYRES32=r21], 0x40}}, 0x0) r22 = socket$netlink(0x10, 0x3, 0x0) r23 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r23, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r23, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r22, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x31}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r24}]]}}}]}, 0x40}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000001940)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000001900)={&(0x7f0000001580)={0x344, r4, 0x100, 0x70bd29, 0x25dfdbff, {}, [{{0x8, 0x1, r7}, {0xb0, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}]}}, {{0x8, 0x1, r12}, {0x130, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r15}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7ff}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r18}}}]}}, {{0x8, 0x1, r21}, {0x138, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r24}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xfaed}}}]}}]}, 0x344}}, 0x21d36ade77e0e709) getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, &(0x7f0000000240)={'mangle\x00', 0x1000, "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"}, &(0x7f0000001280)=0x1024) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r25 = fcntl$dupfd(r0, 0x0, r3) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r25, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) [ 725.122326] IPv6: sit1: Disabled Multicast RS [ 725.135213] IPv6: sit2: Disabled Multicast RS [ 725.145803] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.5'. [ 725.159942] IPv6: sit3: Disabled Multicast RS [ 725.173026] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, [ 725.250270] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.5'. 04:32:49 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f00000000c0)=ANY=[@ANYBLOB="ed359c761dc4cf587830303030303030303030302e933760302c0037774aeb7c"]) [ 725.328952] IPVS: ftp: loaded support on port[0] = 21 04:32:49 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000100)=@md0='/dev/md0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)=ANY=[@ANYBLOB="446f6d6d69743d30783030b9303030303030303030303030382c00"]) bind$rxrpc(r2, &(0x7f00000000c0)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x100, @ipv4={[], [], @remote}, 0xfffffff9}}, 0x24) 04:32:50 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 725.435319] IPVS: ftp: loaded support on port[0] = 21 [ 725.479487] tmpfs: Bad mount option Dommit 04:32:50 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x2}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 725.726863] IPVS: ftp: loaded support on port[0] = 21 04:32:52 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() r4 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r4, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000300)=']}\xc1\xac\x00'}, 0x30) sched_getparam(r4, &(0x7f0000000080)) r5 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$EBT_SO_GET_ENTRIES(r5, 0x0, 0x83, &(0x7f0000000000)={'n\xc7y\x00', 0x0, 0x0, 0x0, [], 0xfffffffffffffefa, 0x0, 0x0}, &(0x7f0000001280)=0x3d) ptrace$setopts(0x4206, r3, 0x0, 0x0) r6 = gettid() tkill(r6, 0x16) 04:32:52 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x2}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:52 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:52 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:52 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) [ 727.985348] IPVS: ftp: loaded support on port[0] = 21 04:32:52 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 728.274093] IPVS: ftp: loaded support on port[0] = 21 04:32:53 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) [ 728.476907] IPVS: ftp: loaded support on port[0] = 21 04:32:53 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:53 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:53 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:53 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d9e3a40f9", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) 04:32:54 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:55 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() r4 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000000)={'n\xc7y\x00', 0x0, 0x0, 0x0, [], 0xfffffffffffffefa, 0x0, 0x0}, &(0x7f0000001280)=0x3d) r5 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) accept$nfc_llcp(r5, &(0x7f00000000c0), &(0x7f0000000140)=0x60) ptrace$setopts(0x4206, r3, 0x0, 0x0) r6 = gettid() tkill(r6, 0x16) 04:32:55 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:55 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:55 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x80, 0x0) fremovexattr(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="73977374656d2e1500"]) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000300)=@md0='/dev/md0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1981054, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r5, 0x423}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r4, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000040}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x28, r5, 0x20, 0x70bd2b, 0x25dfdbfc, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x200a1}, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x200000, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000240)={0x0, 0xc0000}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$DRM_IOCTL_AGP_ACQUIRE(r4, 0x6430) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r6, 0xc00c642d, &(0x7f0000000280)={r7, 0x80000, r10}) 04:32:55 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:55 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:55 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x40000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() r4 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000000)={'n\xc7y\x00', 0x0, 0x0, 0x0, [], 0xfffffffffffffefa, 0x0, 0x0}, &(0x7f0000001280)=0x3d) ptrace$setopts(0x4206, r3, 0x0, 0x0) r5 = gettid() tkill(r5, 0x16) [ 730.895350] tmpfs: Bad mount option commit [ 730.963540] tmpfs: Bad mount option commit [ 731.006455] IPVS: ftp: loaded support on port[0] = 21 04:32:55 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x1000000a0) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x35180e8, &(0x7f0000000080)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303030303030303030303030302cda80c78b753aad772800"]) 04:32:55 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 731.182689] IPVS: ftp: loaded support on port[0] = 21 04:32:55 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) exit_group(0x1ff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) 04:32:55 executing program 5: r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = socket(0x100001400000010, 0x2, 0x0) write(r4, &(0x7f0000000080)="2400000052001f0014f97407010904000200071008000100010000000800800000000000", 0x54a) recvmsg$can_raw(r4, &(0x7f0000000580)={&(0x7f0000000240)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f00000004c0)=[{&(0x7f00000002c0)=""/241, 0xf1}, {&(0x7f00000003c0)=""/160, 0xa0}, {&(0x7f0000000480)=""/21, 0x15}], 0x3, &(0x7f0000000500)=""/68, 0x44}, 0x22) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x74, 0x8, 0x8, 0x3}]}) ioctl$EXT4_IOC_MIGRATE(r5, 0x6609) 04:32:55 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:56 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x406, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) [ 731.360740] EXT4-fs: 1 callbacks suppressed [ 731.360749] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, [ 731.375174] IPVS: ftp: loaded support on port[0] = 21 [ 731.841397] IPVS: ftp: loaded support on port[0] = 21 04:32:57 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:57 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x2}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:57 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0), 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:57 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) ioctl$EVIOCSABS3F(r2, 0x401845ff, &(0x7f0000000280)={0x6b, 0x8000, 0x8, 0x7ff, 0x0, 0x5}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r7, 0xc00c55ca, &(0x7f00000002c0)={0x2, 0x2, 0x6}) ioctl$RTC_IRQP_READ(r4, 0x8008700b, &(0x7f0000000140)) mount(&(0x7f0000000500)=ANY=[@ANYPTR64=&(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[@ANYRESHEX=0x0], @ANYBLOB="61fc7e5d1f44b14ce852d18f1a9288e0e6c73e9088381f840fe06e9180a9d3b40674934982956c488b8b6f8c0190124c17e6f5e3ef5ad6a3001fb4df586960616196af2b3feb74cd11c51ec8eb83e04efc59edcb22662bdedee8ac95d36d51e136e0d192705822b1007ee73cf9229d5b1b730a50ef33c8e34897e13cc16aa9c4b23d9bbb525068d992ecb12d0504fb3e00a7eb040786a8041478341b79962162d95a825fa541962241b372862b5eeee7e088c0f03b21f0219815c9d468383266e25a8b9002d03856d6c19d4decd1dce0e6156fdfb6e3bc7c59f6a522976c42e0252547c855adccc4dd2f51efcb77922fc9b87c7f546fdf32"], @ANYRESHEX], &(0x7f0000000380)='./file0\x00', 0x0, 0x1981054, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000100)={0xff, 0x8e, 0x6d, 0x6}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$VIDIOC_OVERLAY(r10, 0x4004560e, &(0x7f00000000c0)=0xffffffff) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) 04:32:57 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) socket$inet_sctp(0x2, 0x1, 0x84) [ 732.721963] QAT: Invalid ioctl [ 732.767134] QAT: Invalid ioctl 04:32:58 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0), 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:58 executing program 5: socketpair(0x0, 0x0, 0x6, &(0x7f00000000c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) 04:32:58 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x2}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:58 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:58 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, 0x0, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:58 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() r4 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000000)={'n\xc7y\x00', 0x0, 0x0, 0x0, [], 0xfffffffffffffefa, 0x0, 0x0}, &(0x7f0000001280)=0x3d) ptrace$setopts(0x4206, r3, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r6, 0x0, r5) preadv(r5, &(0x7f0000000380)=[{&(0x7f0000000080)=""/187, 0xbb}, {&(0x7f0000000140)=""/34, 0x22}, {&(0x7f0000000180)=""/57, 0x39}, {&(0x7f00000001c0)=""/92, 0x5c}, {&(0x7f0000000240)=""/76, 0x4c}, {&(0x7f00000002c0)=""/137, 0x89}], 0x6, 0x401) r7 = gettid() tkill(r7, 0x16) [ 734.017902] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, [ 734.100934] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, 04:32:58 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKRAGET(r5, 0x1263, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2e2f66696c653000c28210211764c6dc8802e315a8e17879770927f317797b7b3e9fa24108a65b84fb9e19aa427cbfcbfaf7271363b08bbe72c9ba066ea26f345fbecce62046e2fb13a5f1d3286de82edc649fcfa3bd3e7937a030fd0e6327670a8b99707e47a378e2cd1b2b3fad898730a883176cbb1d618b7e5f62a1d1f1acd55470fe8e1fd2da1a197a1a0f327db05749abfb3d51520a13b1fee0d9fefbc446812b13268f3e788c389631e13dcc9c8e3e985b"], &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xfffffffffffffd3e, 0x0, 0x351a0e8, &(0x7f0000000100)=ANY=[@ANYBLOB="636f746d69743d3078303030303030304430303030303030302c001b62a3da6e87545918fe7a5ac87ea5bfbc5687108be0d3ec381a3429b9e057a257c5c24cf555ab9be2ea27ffcc1560cd1b5a1903f2af89bc7d7af31b8515d48b7c4ce2d79a4498641d3ceda34dd46f31ae2b4f36804250abd2"]) 04:32:58 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = semget(0x0, 0x0, 0x100) semctl$SEM_STAT(r3, 0x3, 0x12, &(0x7f00000000c0)=""/151) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2e2f66696c653000c364592ffb882445e6fa2b4e89f4d0bfa4ed09c05864f65aa8aef8243379f1f18be3b9ed2f6f96a8d1641cd66c6435e44502791703a90e688cd12bf13acf88ee22f927f86e5d6465ea097243e037aeaea92374c38bac1c010280f49f048b7bec0d64c2bca296a7f9c528d81e4f786cf5f8838baf0aeb855255842112d082994f8a65ace1bb12eac07d1d85b3"], &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) [ 734.242536] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, 04:32:58 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="be4f2e2f66696c65"], &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000240)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303030303030303030303030302c00344206ccb74226a457016c3a2657d6f1fdd4959b5f636d96c61ce3b1eb91b74809896b51d610312fdb79c1a78c956b70408e5ff4d4259c65d53638f6fd5600a8ea4fc6219b8cf905be492c3615805986aa3d584df4c3a6e37cca7680644f9af0cfa1f6c22b2d529178459622"]) 04:32:59 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r4, 0x2, 0x70bd2c, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x2, 0x1000, 0xffffb8b1, 0x800}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x44000}, 0x4004800c) [ 734.542296] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, 04:32:59 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0), 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:59 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:59 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x2}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:32:59 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, 0x0, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:00 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:00 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2], 0x2}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:00 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 736.266913] IPVS: ftp: loaded support on port[0] = 21 [ 736.401117] IPVS: ftp: loaded support on port[0] = 21 [ 736.757715] IPVS: ftp: loaded support on port[0] = 21 04:33:01 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000180)=@random={'osx.', 'trusted.overlay.opaque\x00'}, &(0x7f0000000200)='selfnodevmime_type\x00', 0x13, 0x2) r4 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000000)={'n\xc7y\x00', 0x0, 0x0, 0x0, [], 0xfffffffffffffefa, 0x0, 0x0}, &(0x7f0000001280)=0x3d) ptrace$setopts(0x4206, r3, 0x0, 0x0) r5 = gettid() tkill(r5, 0x16) 04:33:01 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d9e3a40f9", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, 0x0, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:01 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) pread64(0xffffffffffffffff, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:01 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d9e3a40f9", @ANYRES32=r2], 0x2}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:01 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:02 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:02 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) pread64(0xffffffffffffffff, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:02 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2], 0x2}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:02 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:03 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) pread64(0xffffffffffffffff, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:03 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:03 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:04 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="41000000ffd3ee0422762be0bf928dd19fffa3a65b8cadd3de303b56d8cdbc7366db52eed7a975ad336bedaf3eee642b2ffcdef8bb4034872667da209a0eea54b8eb44956dce12fd6acd25e68fc6d538986b015862ad109656b8bff85a894bdc36abeb23699eb3dbb95b234968f73423d215e903cbb0a19d18517e7a88d2fd03d56a55ce4af4a1b226cdeb88546d46bc6a52bd66baab46eacd0000000000000000000000d7c6d157d325b3357f9be478a54852b7dfc5a844f7ff5812a295a12258fdfbecb7ad6e07e625717d4a6a24d232eb5c50b7faf9966155b1a3a751d058c294ad4239be6d88a95fe0b975a9a1ca2d86956f64e6807d568e3e1ec16c79f28f20b65e1d8f476bbfaba4caa590a2c050749f52b66fdb7e1e8ead6bbc6482bd087bff15dc37b33943b9d4c7b470c125c9827d4a7f7e42fdb48c0a9d64a22fe2c943fd75a60c157c3a76e1644759cb3e10e4ffe8a1e55824a518464153ae326579d79fff195345e86f04f5e31ccb320b060ff1e9a2f455f67555ececd27ff4bacddc42279f70378f295dc74f4796ab4988cc4ad933a720043ed194e6b2076b10c6fa2d2bf5e8d1217117cf31a30fcd769a3a41824299330520114edc1adcb52e55c5103b50a698df05930b0253c4d9796654e510815edb518c06b02ec625e54898ea83acd1dcefba06e198d3d6ab2a7684200b9f5862d9dc4eaeb174b094ad65c16631eea69ecebba609c2884c90186300e4083ea093db9c5d60a0a0347722be524099bcef9064d9ef7192a6814d9dadcb2714573f82d133b52451ba80728fe038355deeb53cc4bf7a2eb7f72348bfa1ce00821195b42e77ccd5c6abc3c1f3cc8d92786576f4be2fd806208505544ea72d06071b22a7fcdc358ac4ef7a6ef3341d5a941616aebcda9f08e0b8627830a0", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000040)={r4}, &(0x7f0000000080)=0xfffffffffffffe12) setsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000080)={r4, 0x4}, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$VIDIOC_G_MODULATOR(r7, 0xc0445636, &(0x7f00000000c0)={0x3f0f1314, "89f8996fd4ceea9428de45ab2c265979923f0ec9a2aa7a656b7f1e3cabb24748", 0x20, 0x8, 0x401, 0x4, 0x3}) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r10, 0x0, r9) getsockname(r10, &(0x7f0000000480)=@xdp, &(0x7f0000000400)=0x80) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r7, 0x40405515, &(0x7f0000000240)={0x8, 0x3, 0x8000, 0x7, 'syz0\x00', 0x20a1}) write$P9_RWALK(r8, &(0x7f0000000440)=ANY=[@ANYBLOB="300000006f020003000600000000040000000ea52470e99b6c68a10d000000001003000000050000000000000020000000"], 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = fcntl$dupfd(r12, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000340)={0x0, 0x0, 0x100000000}) r15 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r13, 0xc00c642d, &(0x7f00000003c0)={r14, 0x80000, r15}) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000140)) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f00000002c0)=ANY=[@ANYBLOB="636f6d6d69743d30783030303098e02aa18abcb73d2fd6ca809333e823d3a88a023e916d74bf9b6d11407ab5fcec990888c6a800b3f7cd140e8e94579f2fbd35b424049cbef911d5c51bdb1d480f5a21c962de4602ed00001000"/100]) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r18 = fcntl$dupfd(r17, 0x0, r16) ioctl$PERF_EVENT_IOC_ENABLE(r18, 0x8912, 0x400200) ioctl$BINDER_SET_CONTEXT_MGR(r18, 0x40046207, 0x0) 04:33:04 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:04 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:04 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:04 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:04 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x2, 0x0) r7 = socket$caif_seqpacket(0x25, 0x5, 0x4) r8 = fcntl$dupfd(r7, 0x406, r3) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r11, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0xb8, "05274181ef372eb5ffb1dae22c13ab6030d98251eaad71fa842f7a7dee2efe351a26dde9f15498e9d58d636dc022858b4eb69d21faee235f3980034368c4b526fac929d6baadaffab201dfe3523d21dad423f243e1cd906c219a08ee49790f82d9e67e6cf2e56d9e1b98af6f101209665bfd128c16b527196a40506139ed06e3cf702e4f27f8c45c87e1bae9fdacc297ab7955f3312da0431a83bbd25b462400fdb8566ea2baaf21285407aa1c2997ee9142215aed001b87"}, &(0x7f0000000140)=0xc0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r8, 0x84, 0x7b, &(0x7f0000000180)={r12, 0x100}, 0x8) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r13 = gettid() r14 = socket$inet(0x2, 0xc64fe8b428d0f06d, 0xc4) getpgrp(r13) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_PIE_OFF(r8, 0x7006) fcntl$dupfd(r16, 0x0, r15) ioctl(r16, 0x9, &(0x7f0000000240)="bc3712d4666cad21f81618a215335e406da0787cde82711be69a3c42fdaea1ef320d89a365ee250273e0c13900a2a611d122e28d8d08a276de37d1715897ad3de7fc52468f9de4a6904fe2e6369f4299601836ba7668e282594b00edabd1f30d59216d16f5c2563f1a83c3f48131e96c49f466c16648b4b8068015c60619876b18a00ad2946d605c75") getsockopt$EBT_SO_GET_ENTRIES(r14, 0x0, 0x83, &(0x7f0000000000)={'n\xc7y\x00', 0x0, 0x0, 0x0, [], 0xfffffffffffffefa, 0x0, 0x0}, &(0x7f0000001280)=0x3d) ptrace$setopts(0x2105, r13, 0x1000, 0x0) r17 = gettid() tkill(r17, 0x16) 04:33:04 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getdents(r5, &(0x7f00000004c0)=""/165, 0xa5) r6 = syz_genetlink_get_family_id$SEG6(0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x25, &(0x7f00000002c0)={@multicast2, @dev={0xac, 0x14, 0x14, 0x1b}, @rand_addr=0x6}, 0xc) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000044b54aa3d1dcec5c00", @ANYRES16=r6, @ANYBLOB="000026bd7000fcdbdf2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x20008080}, 0x80) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2007200}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="00082dbd7000fcdbdf25020084df040006006700000014000100000000000000000000000000000000000800060009000000000002001900000014000100ff020000000000000000000000000001"], 0x54}}, 0x800) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) r7 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r7, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000300)=']}\xc1\xac\x00'}, 0x30) syz_open_procfs(r7, &(0x7f0000000300)='fd/4\x00') syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000340)=ANY=[@ANYBLOB="6330fcb230303020303030303030302c00"/27]) lseek(0xffffffffffffffff, 0x9, 0x3) [ 740.246171] EXT4-fs (sda1): Unrecognized mount option "c0ü²000 0000000" or missing value [ 740.308181] EXT4-fs (sda1): Unrecognized mount option "c0ü²000 0000000" or missing value 04:33:05 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./file0\x00', 0x0, 0x1581054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) [ 740.451833] tmpfs: Bad mount option commit 04:33:05 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x8, 0x0, 0x0, 0x351a0e8, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0x1}}], [{@dont_appraise='dont_appraise'}]}) [ 740.599417] EXT4-fs (sda1): Unrecognized mount option "dont_appraise" or missing value [ 740.653092] IPVS: ftp: loaded support on port[0] = 21 04:33:05 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d9e3a40f9", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 740.793278] IPVS: ftp: loaded support on port[0] = 21 04:33:05 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:05 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:05 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:06 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:06 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:06 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:06 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:07 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() socket$inet(0x2, 0x3, 0x20000000084) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = gettid() tkill(r4, 0x16) r5 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r5, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000300)=']}\xc1\xac\x00'}, 0x30) sched_rr_get_interval(r5, &(0x7f0000000000)) 04:33:07 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d9e3a40f9", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:07 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:07 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:07 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d9e3a40f9", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 743.811491] IPVS: ftp: loaded support on port[0] = 21 04:33:08 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:08 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:08 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d9e3a40f9", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 744.124530] IPVS: ftp: loaded support on port[0] = 21 04:33:08 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:09 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:09 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:09 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:10 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:10 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r4, 0xc00c642e, &(0x7f0000000180)={0x0, 0x80000, 0xffffffffffffffff}) fdatasync(r5) r6 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0x100001400000010, 0x2, 0x0) write(r7, &(0x7f0000000080)="2400000052001f0014f97407010904000200071008000100010000000800800000000000", 0x54a) getpeername$inet6(r7, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000380)=0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x10000}, &(0x7f0000000140)=0x8) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000240)={[0xffffffffffffffff, 0x2067, 0x8000, 0x1, 0x5, 0x6, 0x6, 0x6, 0x8, 0xffffffffffffff00, 0x9, 0x6, 0x5, 0xc0e, 0x0, 0x6], 0x1000, 0x10}) r8 = open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000300)='commit') mount(&(0x7f00000000c0)=@sr0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1897014, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000340)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303030303030303030303030302c00b1b9bd7e06331491df0dea416b"]) 04:33:10 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:10 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:10 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r1, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000300)=']}\xc1\xac\x00'}, 0x30) r2 = syz_open_procfs(r1, &(0x7f0000000080)='statm\x00') setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f00000000c0)={0xffffffff, 0xc242, 0xff, 0x83, 0x2}, 0x14) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = gettid() r6 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$EBT_SO_GET_ENTRIES(r6, 0x0, 0x83, &(0x7f0000000000)={'n\xc7y\x00', 0x0, 0x0, 0x0, [], 0xfffffffffffffefa, 0x0, 0x0}, &(0x7f0000001280)=0x3d) ptrace$setopts(0x4206, r5, 0x0, 0x0) r7 = gettid() tkill(r7, 0x16) 04:33:10 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 746.280497] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=20506 comm=syz-executor.5 04:33:10 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x9, 0x800000) openat$random(0xffffffffffffff9c, &(0x7f0000000240)='/dev/urandom\x00', 0x20a100, 0x0) getsockopt$CAN_RAW_FILTER(r3, 0x65, 0x1, &(0x7f0000000100)=[{}], &(0x7f0000000140)=0x8) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) 04:33:10 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r3, 0x84, 0x1c, &(0x7f00000000c0), &(0x7f0000000100)=0x4) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) [ 746.485234] IPVS: ftp: loaded support on port[0] = 21 [ 746.491086] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, 04:33:11 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a5", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 746.552807] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, 04:33:11 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f00000000c0)=ANY=[@ANYBLOB="636f016d690500000000303030eeb4241fc91f72ad000000ccd6653ffffff300000000"]) [ 746.714670] IPVS: ftp: loaded support on port[0] = 21 [ 746.721536] EXT4-fs (sda1): Unrecognized mount option "comi" or missing value 04:33:11 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x100001400000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="2400000052001f0014f97407010904000200071008000100010000000800800000000000", 0x54a) ioctl$sock_bt_cmtp_CMTPCONNDEL(r2, 0x400443c9, &(0x7f0000000340)={{0x7, 0xb9, 0xb3, 0x65, 0xff, 0x3}, 0x9}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) 04:33:11 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 746.850734] IPVS: ftp: loaded support on port[0] = 21 [ 746.868026] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, [ 746.935113] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, 04:33:11 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', 0x0) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 746.982785] IPVS: ftp: loaded support on port[0] = 21 04:33:11 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_GET_REGS(r2, 0x8090ae81, &(0x7f0000000240)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r7, 0x84, 0x8, &(0x7f0000000300), &(0x7f0000000340)=0x4) r8 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$UI_SET_RELBIT(r9, 0x40045566, 0xc) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = fcntl$dupfd(r11, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$EVIOCGKEYCODE(r12, 0x80084504, &(0x7f0000000100)=""/73) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) [ 747.069211] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, 04:33:11 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:11 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$VIDIOC_S_AUDOUT(r8, 0x40345632, &(0x7f0000000040)={0x93d, "13d7ce16a3f4246a52797ff3d8f153d734ac184daa0d2dd78f133dfab99c0b86", 0x1, 0xdf815ba514778b28}) fcntl$dupfd(r5, 0x0, r4) r9 = socket(0x100001400000010, 0x2, 0x0) write(r9, &(0x7f0000000080)="2400000052001f0014f97407010904000200071008000100010000000800800000000000", 0x54a) mount(&(0x7f0000000100)=ANY=[@ANYRESDEC=r4, @ANYRES64=0x0, @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRES64=r3, @ANYPTR64, @ANYRES32=r9, @ANYRESHEX], @ANYRESDEC=r3, @ANYRESHEX=0x0], &(0x7f0000000180)='./file0\x00', 0x0, 0x40000, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) 04:33:13 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a5", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:13 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x20000, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1981054, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) 04:33:13 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:13 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', 0x0) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:13 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:13 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigpending(&(0x7f0000000080), 0x8) r3 = gettid() r4 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000000)={'filter\x00', 0x0, 0x0, 0xffffffffffffff1f, [], 0xfffffffffffffefa, 0x0, 0x0}, &(0x7f0000001280)=0xffffffffffffff59) ioctl$VIDIOC_S_MODULATOR(r2, 0x40445637, &(0x7f00000000c0)={0xd95fccb, "5f609a8483b7a88812db353df5e86ab54e7f7dbce9900f5677d3fba21d0e8142", 0x10, 0x208, 0x19, 0x2, 0x6}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$EVIOCGVERSION(r7, 0x80044501, &(0x7f00000001c0)=""/201) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x80000) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r9, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r9, 0x84, 0x72, &(0x7f0000000040)={r10}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r8, 0x84, 0x75, &(0x7f0000000180)={r10, 0x9}, 0x8) ptrace$setopts(0x4206, r3, 0x0, 0x0) r11 = gettid() tkill(r11, 0x16) [ 749.233818] ptrace attach of "/root/syz-executor.3"[20621] was attempted by "/root/syz-executor.3"[20622] [ 749.274087] EXT4-fs (sda1): re-mounted. Opts: commit=0x0000000000000000, 04:33:13 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file0/../file0\x00', 0x40140, 0x98) setsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, &(0x7f0000000240)=0x8, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000140)=@loop={'/dev/loop', 0x0}, &(0x7f0000000100)='./file0\x00', 0x0, 0x3d0cf3d468892281, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x351a0e8, &(0x7f0000000080)={[{@commit={'commit'}}]}) r4 = socket(0x100001400000010, 0x2, 0x0) write(r4, &(0x7f0000000080)="2400000052001f0014f97407010904000200071008000100010000000800800000000000", 0x54a) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 04:33:14 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 749.546243] IPVS: ftp: loaded support on port[0] = 21 04:33:14 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a5", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 749.668797] IPVS: ftp: loaded support on port[0] = 21 04:33:14 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 749.786613] IPVS: ftp: loaded support on port[0] = 21 04:33:14 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 749.884442] IPVS: ftp: loaded support on port[0] = 21 04:33:14 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', 0x0) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 749.978783] IPVS: ftp: loaded support on port[0] = 21 04:33:14 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:14 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() r4 = socket$inet(0x2, 0x3, 0x20000000084) socket$nl_route(0x10, 0x3, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000000)={'n\xc7y\x00', 0x0, 0x0, 0x0, [], 0xfffffffffffffefa, 0x0, 0x0}, &(0x7f0000001280)=0x3d) ptrace$setopts(0x4206, r3, 0x0, 0x0) r5 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r6) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{0x8, 0x3, r8}, {}, {0x8, 0x0, r8}], {0x10, 0x6}}, 0x3c, 0x0) r9 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r10) r11 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000003380)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000300", @ANYRES32=r12, @ANYBLOB="08000000beb00bd8e75c6bcba52092614c8d9a93d72b5c68fbbf888f67999a72692831fc3aeb31e2bb18695cb1eb952ba47b37da65a2db03f33bb76358c4f1ccfc09f95ca8c4ecb33fcf7edca5d4fa98847abb5bb0aeafc0daa6406947d08acbd4e795b312e79f8535e22c7a44aeb3554f8b87195c820a0b92041d37786a2c6ef820ed7b", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r12, @ANYBLOB="10000600000000002000000000000000"], 0x3c, 0x0) r13 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r14) r15 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{0x8, 0x3, r16}, {}, {0x8, 0x0, r16}], {0x10, 0x6}}, 0x3c, 0x0) r17 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r17, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000300)=']}\xc1\xac\x00'}, 0x30) r18 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r18, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{0x8, 0x3, r19}, {}, {0x8, 0x0, r19}], {0x10, 0x6}}, 0x3c, 0x0) r20 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r21) r22 = socket(0x10, 0x6, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{0x8, 0x3, r23}, {}, {0x8, 0x0, r23}], {0x10, 0x6}}, 0x3c, 0x0) r24 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2, &(0x7f00000006c0)={0x4, &(0x7f0000000680)=[{0x1, 0xe1, 0xf9, 0x2}, {0x3, 0x40, 0x9, 0x465}, {0x1000, 0x25, 0x3, 0x6}, {0x0, 0x6, 0x81, 0x8}]}) r25 = socket(0x100001400000010, 0x2, 0x0) write(r25, &(0x7f0000000080)="2400000052001f0014f97407010904000200071008000100010000000800800000000000", 0x54a) r26 = accept4$netrom(r25, &(0x7f0000000940)={{0x3, @netrom}, [@default, @rose, @rose, @remote, @rose, @bcast, @netrom, @default]}, &(0x7f00000009c0)=0x48, 0x800) r27 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/relabel\x00', 0x2, 0x0) r28 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r28, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000300)=']}\xc1\xac\x00'}, 0x30) r29 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r29, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r30) fstat(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001100)={0x0, 0x0, 0x0}, &(0x7f0000001140)=0xc) r33 = socket(0x100001400000010, 0x2, 0x0) write(r33, &(0x7f0000000080)="2400000052001f0014f97407010904000200071008000100010000000800800000000000", 0x54a) r34 = socket$inet_udp(0x2, 0x2, 0x0) r35 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001180)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r37 = socket(0x100001400000010, 0x2, 0x0) write(r37, &(0x7f0000000080)="2400000052001f0014f97407010904000200071008000100010000000800800000000000", 0x54a) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r39, 0x0, r38) sendmmsg$unix(r0, &(0x7f00000032c0)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000600)=[{&(0x7f0000000100)="0ae80981c1489150b9533ba712e495296e80b8f37c746ae9bdebc0120de534d169b8305e2c448f90ee7439685b77d80c9143f0b14dee8ad78e0e2cbe2e71eee8f321f4a6b16c5c47e68d6e1547ea72a47e15a99dbb5a1cabcd166086", 0x5c}, {&(0x7f0000000180)="a79bf2db5dabc108642c244aea13b164ae2bd70194bf0c2ba650c3be2bc94976a384c6f7a5d769b7bb8fcbdb51b885bda91436498296192a6ab4eecb485336bc7f6e3eb16c196b30231068808e271f59d6e60ebad3e6e16ec85d0886d21569a8f86c97c2657596b3a9e1c8ed794c83a42807da73bb47e9c211825d77b40981fcadd5a72e158f3e09f87eb78f6be6f6fae6ad5794791c55a90c728ceef99b9c565ee9c52e045046546bca5adc7e5c4bf748df2d3d9bcadf17344f93d56f44b128", 0xc0}, {&(0x7f0000000240)="65a3fa722e5081eeb64930667ab5447e6809db09eaf9a998fd8f4d047c626f98ecc0ef2e9c61c839290970e8010b08342503a29ea7c0c8592bc350caae6b88c748041bcd58e0714a47c1ffac5e2426f1c8b49207ce5974f430d0015f1233719060acacbf4b69fe22afe78681b58abadec819f1b89e589b58aa5c8bbf0c8a111571ba439aa6fa27d2cc2a30ed41b4d2693b1a3728baa070426390d6cc64b6e004d1baa507c223c10169c12cd87c742ddc2f99af7f6576c627631647e1e92f82eaf699a379acdc30054df393b0071942c4855ac3ec5327304be82615ddc8b876201f8d7863582e1e2cd44b6cdfc0495a", 0xef}, {&(0x7f0000000340)="d22ae3ae2741808c4c55bbbee1c6d83b9bfdae3009dd282e4d4870e0f8f81124abc3a49f64c400049094f59dd2a9a412a9f8c404b870aaeb81b19c0aa23af0fc94756bdbd8e0d8dd2bea440cf312b5e74b33ee601304013da8e6f31dec40bac47885b616cb325d54a7337dc8dd574ff4f92197bdcdad5d8b48d96ba3766142ad9a3697da772ae0", 0x87}, {&(0x7f0000000400)="6aa8acae8479854dff84e6096df147fe648a9fbab32d145f46731087598ba3f194dda6aec7e7db3f8de6c5bb2c77423a7a8f8de19890c7d0ae12e7802c330ba27b003a24820703673bf442a1791c9c048afe66cc6d8db2cde461cbfc4da129502f7658f3309fc6f3106390b1d90f456fb3afc631", 0x74}, {&(0x7f0000000480)="e72bb636a4ffeab515d72ce11c6f401d86d4c47714bacd10f07ec39954821f245e0f318e809232b04af54588270da062b5bb2357f42fe7fa8b7ba2f46723c06853053691a6694588d70f86d0d03e4143e8e13536b55f35292333243931ad80c663683ef4e97445efd127160d51e4b5", 0x6f}, {&(0x7f0000000500)="3804827b8dba22e9c24646602bfde31a4056cb3cab90c43cdb3b632232db37986014a03351c65a8072ddd1b227182d0ec8de12cdbebcf66aec52e8bfcefa6d3fb8be574958370216bbce6f6359efaa9901dbf58b2ed6546eec20ee8d4550133aac359667b2b5c02d36df033d74bfa1bfd64cecfd05dca88f9c13d786b02758c80b3497267e8e6b0401df940d67c8809380a5f442afdcaa2694b397ec990d310aedb7a0662bc23189040910b61fc082fd9aecda2b02aef92000ae8fee2599d03a3f36dc7426e2b764380a0e82d08db6ddec6e3f1b45c5", 0xd6}], 0x7, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {r3, r6, r8}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r10, r12}}}, @cred={{0x1c, 0x1, 0x2, {r3, r14, r16}}}, @cred={{0x1c, 0x1, 0x2, {r17, 0xee01, r19}}}, @cred={{0x1c, 0x1, 0x2, {r3, r21, r23}}}, @rights={{0x1c, 0x1, 0x1, [r24, r0, 0xffffffffffffffff]}}], 0xc0, 0x60040a0}, {&(0x7f00000007c0)=@abs={0x2, 0x0, 0x4e23}, 0x6e, &(0x7f0000000900)=[{&(0x7f0000000840)="84b3d33d3337f24a7bb77ec48751b6d9aee12d17a8c5965ae8599785f67e4b2a0a275fb5f394e971aba28b246c46ccb59f5e2934a428ea5b74c5b1e15fb74efd9c6fc759ee8ffc41adb703baa97b722b9515280dbab523a7e7f49f6ac470d372b7d1a22c4cf9ccb20fd9c4f34fea632b65d8d0a6", 0x74}, {&(0x7f00000008c0)="4aa54d546aade5acaedde9aa8864c08d6669c5d0fa692431c6c6b26a6f9ad9d4bbc1217cac4817305c21a622cba272dc4a06b44955ae38ffe6df30", 0x3b}, {&(0x7f00000012c0)="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", 0x1000}], 0x3, &(0x7f0000000a40)=[@rights={{0x18, 0x1, 0x1, [r26, r27]}}], 0x18, 0x4c151}, {&(0x7f0000000a80)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000001000)=[{&(0x7f0000000b00)="e3690a2f8aad51b8d1191375761d2eb5ce6151ab98d790d09f6b2e9ffb4c4c0f528cfe3d60c5a4455a808c0333da43857e8e421e56bcb46b47cc8a576c50b61e88b96c54f55d5d51b37229efc97d6e29804c3d720d092e82fc87b342e2b88b92a3dade99fafcb2f925e90fc76cb049400369ef6ad89c401dd49ce546598009e22c2423bda3b35a9cbc48ff7b6d9d217cabaea2e6ec88a64d42f06d690f56e6fdf221b55c9ccd87a6df6a44c5dca7ae4810993358093e00e5fcd009ea772f", 0xbe}, {&(0x7f0000000bc0)="2a8f6d857cff227e51c8c377c1daa7c45786b77f85ee93ac5c2a3ff0f9363be43bca0f58ef892025eedb235a186b6f7652d1f8bade61db30782411db32ae4826746b456888d82eadbda403d27b9a2e187ac7d79f4bc799c393eb1e1b612f7df49bd924e4c3230c45a89dc22f191be6e96ec0cfac8e8e2c519cae78f014aa18861a80eb2547089f6c7e8f91e95b788e314726d4c837a3748a4bce39a946f17f0a3dc70c7323155f3fbffbaebf993871dd96b81496444b8eaea7bd242ac6edd9c583732ff7db7e9b26e21434f1a5565616f834d72af81f8f2457ca", 0xda}, {&(0x7f0000000cc0)="ba503b14cf8b6f97ae450db22ca5a0c6c60a3df7e8ba8cfa17795b5aca246793a1a4478690b2bfe4bcc65828e49f938c8265037da3d317cd539d5c4de57b8c9375122f4b99a5247bb9bdd1cfaf2c6a98cfa42b39a2ad3bc12be9e0ce07b011c9c978b7aa788da4ef8e50a87d5f10b006ecdab70e8508558a5310da4b30de9c4b23baa2ae82871f06bca8f1b8c09e3abd07242f5ccb9ceb21997575f7f938d82e294e254ce5b408d8888b46", 0xab}, {&(0x7f0000000d80)="8fc1a643edc4a560c0b4e8744fe63215ca001a5cf83b76b18219f0748e9ec14457d8fcc0e15ce860e304f3b5ca6d5ef6fb0ba88afddcd319d93b8aa50e3babf0ff6d4c6c6708a1c9ecac47c667b03a8084a8c4df0f824c2a358749d2024e47938421d43a9d7987dd959d19abcdc1f40f5d2c5969e51c91e2b63ef43c626a2236d4b1d3a40d37f0694fff0190633d6f3d209c6fae8a26", 0x96}, {&(0x7f0000000e40)="716910e65cc95218ad1020c0d232852dcac8fbad3e39be835195c2c6e0953f7ac3670b532593e357c011da12ea0382cba5d48b21b168d6401155c704467c0a8455add162a30ea79f77f3e8112866020c0e9969041cf7b09771f9eb60fa6c238b7442be63501b5351449ea0a1f6459f936ab3b8036a273ec83e09cdb858090de999e29631f3e905", 0x87}, {&(0x7f00000022c0)="32d6bf1315fc49b3b4077abcdca68655f05bba80cd240611385e682f8e1016f292f9beab7fa76868dc42bcb39b05a986d286e8f3c611f44cb444f74223dbfd36f52636571461d8fbd41ed088f0da76a1df776485fb00abfc586bc86fb3a8969d36ff9e31272701cda2e41f8f4dfdc18b99278067e844ce9b2873777161e377f385a6befe643ea7018e67b0637cfed3fd4b35905da11ddc10d6aed9e4da85495bd3b9ae9a223a913cc2651d49fb76f9645860a39dc266886b2db40551fb62c2765844a81a93d7d8f2091f471e9a3b148a2234abce8a7ec6cb6a39b34861486715242503a7a8e4b75d238c6b002d1c1abc554b1983e98f22bb5c36637bd845b518c0dc3d615e983ca9bde161d28651b41fd1e15947331bb9f2a56cc818f79aadab854d27576cefbd7c863057a008bd3a6517dfde72b3572ff3aef2a553435caced73962c48b37bfa689b9a770c0c23f6592e319de7da2e524d8973df15dfc8d737823b60c569fff360c7c6cabf6bbf51209b12d3b70a62b2a7dbde8f108ebb492df3a1c94a53948c9503d8adf8f609a7560208f3e834eb887904dcaf44e89ed20e9bc4bc6ef23e3788dd97a3e94206dfb341ef4b9150612ecd9e2d88541eac4a9d7290510cedc26718cf6a23437297d271007f7eefa20541e8d866e89a37484b354bf56630fb5546c278a97372ccb2de29db04bb42216c4cc2b1481f4e58ee2df4ce404e9b4f8e64aedc0e9e39bce99a7c1d065848e6b3450e0b60f00972fd449d30fa475c5441b522f6c16478af6893980b7fba4ae2e0317bdfd74cabf24c5bda060e247e061e0be8f71919e31c816679a5cca03a324c5d91998f837d9d71532830ee45b2e423e20655032fbbbb661ec8923cbb2de970112cbe2ff659cf82b1e31a59be525f72cb8eea98912b1637421cb4db948f5c47e140dafa1bd1d4f3409d7d3960084a0ce75c97d465a01f5f3fb286004ab86e9d3a8ff3a6075791d8a315b2df2172b8522ed1b2bebcd652e038e3c5f3f73951bc5d8f8c46dc8426e98b5718bf7ee32e4907d05089ca65980a45966bdb52074ed8651d70528d4df8150eb2e3899fde7db2a80f28cf911ac55152865572de1101d7fa9162e25f999c7e60f3c1c521ec20bfa64f2e537e8b44878767d1dbc8d2da1a0d205baa0ac6c1167eb8be0e26622f9a3e54074ad77ac70d09b1251f910e0d28d9681f5a95f129d19a2655e22effd26ef61a72fb6209ce52902409893578ce9d1687721d1b27556811a415ba93281da6ec985d16d0fe160ae7c8c3f9cc71aa8e6579818febd588c225b5b3e124480b57b07dda520728f5ca4c6fcf1a203a379d5a70cf77e94468f796c1ede6c5b3b862fe0255be657316e3f93f2886962bd56bfa09af41cf4a919b0d2b858e3e4bcedd516068393fd28ece408d600ba8b2ceb6c20bacffceb2046b18e15b28494545856043b5143cd053d7c84fa22e1aef3fab80473cb024afc70fefc517a67eccd369f0cafc8625d1316eef617340b4c3f261a87fb517edb5d38fbdd25c370cc32721dd86c9cf1dd679a03f59bc795148ce7b5cef9d27993068f501d8f274bae19d72d6b576bd9351dbc34eb72dae2b14b2177d027a6304d40713efc11e51e689ba83c00c48d696cb90e9011d23d00476084f21cc6fa9c1c24b72e4edd7e777d290b6775d929a730756ee3cca82531b569568e8490c5dcfa49948f27d5e14cd045e19a3af74ff32a4aa87bf29fea914ae24c98fbc314c1735f5c7c61399e6d9f59ea0fae4a1416de682d3b7c206191e9a93b01d2b5b830a13c5cf6bbdc6c014f3bfb5135ae012a0ee12431d9fe1a6e0b8e3801554e9bc6bcda8f7ed7b2fc3a0d3426e7d3306f886768ffff3b5b80fe0cf8831f97c11d80a4cbbbcc60821f223e20cf932f8097f7d85c0192628aeaf3f5a9b8d3e4dd9571c15eb875222e35c57cefb778b85bf2e425f82ba7c574ad085bcb998033998d6562fcf3bb70f7d4f9a4bd35966ab55f9ee495c8e7bc09ce623c1a4c7a41bb7539c58e10ea1bf2c4a32341147a32916472388cf54230a0c69f685fb691e96b7288b9cd9f11592adb052edc48c835b456f679ef6296cfc07938d9ba174a016cd9027880dbc2bd5e392d131541061ecd2014a2e3fdc90890c65588384041a7b748d16f5a9a7896aa42b622af2432df77d62abffdd123e3ad7e7fb4c901a26e3d1c95608e5a8050b85a659981be1836b124e2f81b0a2371501c5ef763f3c772d75d64218119d2a7844f65aafacd99262b650ab991afb4a2613c9a4f299cf05def8d83281f1d9fa8250f8f584e0fcd1f362152770ecb4d7f550fd4b977a7cbfc736e3de096f728093fec89d5926a962ffbfbea8889dbf9d2b5031128dad7bd81cc243aec2d91961d8f8a9aa4be2814e6debd42915f921675e397e9301b06e374151b0778b7ed12c167fc74a93f7d21f95544a79675f27a94340d8c50505418efebe4a446eb1e5ea8b4ded1d481f6180e9ec645bb7710eda4fa5e809da8076dcd19693c495a024c967718438e83afc61ac15e7946de4e5720cbebf81f792da8c3a554c074547cf8f9c4fa4ec596533ca9be2046e0190a5d104b49a557d62aa9eb4b72a84254977b6d0fcdabb8d163921196fe2bcc5ecc96031926391ed5fca05ede5c063716886b811e728bc64a8ac2ae5f098c744c50e78db2831b0d805f550bab0cde2d067da2f06b8f1d18e05f8afc5bfbc596e09622738a2de98258a1f2673d8ca0a644564c7be1d73141f87df74e29c3fc86edb00410f88370446d921cf27c407ea159d4c434aba914d8f783bf3f66f930ffa46fb2876e70484032bfa0bb76bab7a49a317372692db23985f6cede4f7ad93a0fd2da6877171aec110c37d383d89bd3dc513ce069ad81c1a2124a0f318ba1c93eac42ed5d1670a3352589218d5a1836e5ff97720bc11ad46831635d1a9bcebfd6eb4cb9630dc408ecd0649982b098d7bbdbc7ab49686ccaa8ec49770b60158c301da01c335555e3f9231b495a685d7656c7534045cf58d83308cc1825091c04084a6c090f9e2744c7ecf8ffcaf47a1acedcb19fe8282c9cbba89606309e04e93729ff031cca76710cb7d25249b02d56b0c34db6c2ffd8e44fe1c81dcc38363255f8f8bdb88c266adef8cbe6dbacfc1ba47d58392087dbce442aa15313cec77d6ca754194480629c80b370229da4e9d7e6cc78e273f845daaad8dfacb751433180940428858a568d0143788af27a66f6db95f059e301cbc91435e31690d669fb65e2c7108842dd9cc895865f2a390469b6516daad9d1bfa010571ede7634e08e395083db8f88216b3881214f41bed2b9de3593f19844d2560f04ef036fc87c1ff89970c1f9ca0604d206a952d047a97f9e7ca4272476d3e983cf3dec97c3bf3bb4bde81f3c4ddec205ebdc616cf57d6081014431034e53bda7f486a72001d483252becfce98d7002b76583d178d8e05980b286fec0b87357e49ec96950758c7c1356c656ecfc1eaed0e030a679d27f4ccab18a1720444260e5a1a72af06811386c8bfb1abc3b856c2d99365c6fe1fbcdfb0fa7cfa851a942ec0bbfdc2e633bda6e194ff3105d7a9e8cad401d2957f78787cd1ff5ffc6cc5f0b0891a25eff0144a6dfb6f8dd5356296b31285f670f77c3d02a1772c99d1bc52087c4fd585b38b8d968e8dc2b2211f26fc11285992dd98abfacd2ed0941c1a751f75f70ba1af8d28ca89e1b18a330f35246e862dc0b9c48612589ea6f7b9bb8272c15eaee7210e81bd16a013da51a190f0cf0cb36b00a952b5c2ff3e0471247036948f6fd3ba5445bcdcaa74ec757308e0c9e0967c8e9905efcc73665465818fef0dc9f419e65106720ceba4426ac7c7affe823d1adebe33366971c2635d451b7ad0865af85d6778736ca89a557891a5ddea1622f6a82e0151e2be332e8d84104b3af66fa64db22e7ea12b48a2ed2b5face6e099c4bb9fc9dabd002f2f941ca8044cb0c555f9a5d80807ac8722621ab57c6ef7d4f4b0ab5c20f08e770b9119a541c943c1e2e8cd46b24335c032c39ac88a0ba629242332f75425b5cc4610cbcdb4f7dc9d6ec6f5a1ec3d558676fced2fada8251fb2111c4788d02812ce47c4529355d79394607022b3846022d4d18644dbd7b3023f2ebd739898c43d2ed553a701deb6700174e33f5af37bf7c01b24ac824a88ab5dfe58389ffcf52fc212d56357d100dd1e3d8d239dfbec1006b4b2a2f9853bce6eb1df39d1b47f3312800203bb8dc7ff790e9a0912b85d35a04f7da3d840e756b1cf66788cb67cdd7f915311ee485c173f3edb80bf20b0560b2fb8fa69885184fdace5be57ed8d37d0d76b744c427be7f18b7dd436402bd0f019812bac0fb34eec4ac550f0a97ab1cb487174cfef1dfe560837731cd29c51306153f238a68f42e09ec87e412e3ebbdac7f15a8387cd8c5de1ca148b5357baa4f0f896a1b5c9711de73e7272eb9d51f33bec9db9c7cd1410c65c8a43f75efe4730dd7865184b478a119d72c42bb0faf491238ec12aad39b5cabb5301255a765e4efc50b82938484e9a1fde0d88c30f14db9144227a56295aeb2722c280ae7f62d147f9d1ddfec097e2c49f7b3ba1e4c9c2372463583323f07c329d5071c85a85b311f3d2c84033ff236150cc11f661a7c4c0b43767b0ba1106142354372a6952f29a34dacfded9a5d944ca4d338704bc8cbea808327c6b6b4fb358cb4392d0a1989f1b72ce8096c5b0bfb33ea8028e2d3535fcfb3269acac54c338bd9943cf2a5cee4f5fe51113a684098856da06cbdeb4729e2d2f16368f93cd46206c77e0a805279e4163219148fcaaa4d18b83864ec098fde2527b1f6ac2bf47791f72bfb40df1690bb09cc1c5bb237c7ad16e698f60d61e41a9da2d30585850b6faebe3bd8f59ae996754d15de8c10f79b6f2a1862a1bb04894c7a60e443b0c1c630f390c010b3eec4799083a7732aff2ea937cc62724db4ea871932007057723db5e76b5500612fc175a7251adf0ca3614aef62fd95a12d1893842a7e262bb434709b67ccc7042febf130eb9693fb3204a67ec7b2755f105daacfc1732fce2c53a438eb96e2eb82d4300eb1c4b89840c4a76a551a39c5ba93acdf9a560b9d26c9bdda2deabd90e3ce2891b7b12cc50ef3976c2607d6edc97bbfc51528205c9a9063111fb97afdb277fb314e275512534ada347b8147a73e0bc4a131dc5d1e1e5fd5c74a0d0eb440c96a0676a3013b0f0f3d03e082582c05828aef2c9fc2e3f4f17229ecbe3530ec5d0ebbbccf8d7997ef4b6c5aaafe9dd3666f3b1b327fd4d63d07196917fc0bd661105e58d4db6aef7bab40275f89fc406b95ca9cf960176a650e8daada49f8af49af0fba4bd79caa2d4d55307d9dec73da9510f3d0c01f2f0908b0d452c29133c09d287ddc7c1704407561d920d1092bc55e96df9e18b0134cec9c9bec32127ce049b44dfdbd1771d671e0d50f19292106166f0684fe8d9f5d4a5fc5862966f24ea6ecd1d06b085e462fd85669e5f1175ed9d9a21903521871aa2c9b5fab148ab7695a22a974c53fc310bed9db93fb80ea4ea1f6396cd1c68c77e44df5830ed42615310c3dc791089e78c8aaad5cce77775424cbb2d69d04a34c2fa9bf674e1a66a3c5577d285841a55e201533e82803ddc067b4e993ff705f6d45ecad24d2a4157f83bae5dccced9e656c057297ca30fe13170a84d952fcd6a7969106762ab75a37a2264f3137b4715ba783b83c3e133cec72054fc0d2fc58db892e26187782e917baef8fe1b7aa9e23212", 0x1000}, {&(0x7f0000000f00)="72a704b0e1cb18d3ddd35441631f9d4cfcda565e24e42c917eebc84b90f1e39e6fd04097bb4be552f5527bddd45d57038faa6ad4b89e58191eeea4cbd5d5b37468f85d2d15af80c1f4cded197a51d7e15ed089fc57036144556bee061df10becb7235873acd42679128d40bfc55bcc726dfb0f90076aec1ada67df6ccfe87bb3d9280f5bf8717dafe5ac678a6a3583e309ca0091be5e887d580ac0f6237809d20c9da3bb8ed87d9b2f8b4b66dd99031aaafff1f0e9f0a0be74a5a93d8c7345452ee78c6b1601803fb1cc355af691436e8839b0489ba1bbfe85229ea8", 0xdc}], 0x7, &(0x7f0000003440)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r28, @ANYRES32=r30, @ANYRES32=r31, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=r32, @ANYBLOB="01000000280000000000c9198d454a11017a062c086b57cfdf7d9de385e69029e3a218de109acbf45051", @ANYRES32=r33, @ANYRES32=r34, @ANYRES32, @ANYRES32=r35, @ANYRES32=r36, @ANYRES32=r37, @ANYBLOB="20000000000000000100000001000000", @ANYRES32=r0, @ANYRES32, @ANYRES32=r4, @ANYRES32=r39], 0x88, 0x4800}], 0x3, 0x50) r40 = gettid() tkill(r40, 0x16) 04:33:15 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:15 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:15 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d9e3a40f9", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:15 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d9e3a40f9", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:15 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d9e3a40f9", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:15 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:15 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccb"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:16 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d9e3a40f9", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:16 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:16 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d9e3a40f9", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:16 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:17 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() r4 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000000)={'n\xc7y\x00', 0x0, 0x0, 0x0, [], 0xfffffffffffffefa, 0x0, 0x0}, &(0x7f0000001280)=0x3d) ptrace$setopts(0x4206, r3, 0x0, 0x8) r5 = gettid() tkill(r5, 0x16) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r2, 0x28, &(0x7f0000000080)}, 0x10) 04:33:17 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d9e3a40f9", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccb"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:17 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001200add427323b472545b4560a117fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 04:33:17 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:17 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc3", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:17 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000540)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689, 0x0, 0x0, 0x2], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x42424242, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 04:33:17 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)='+4', 0x304}], 0x3) 04:33:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="0d00000000003639408fa3e6e0c9060199783b0a82f79b32a7c8225086600a38e07d4db88a66596759e95307b680ab73e03c53555c97e8e37d01da4d44a994354a9fa3f35521a51a1a3f49d7b3c4e3d596992bdd8f877780ab3495e93aec13ff", 0x60}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 753.479538] IPVS: ftp: loaded support on port[0] = 21 04:33:18 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 753.571252] IPVS: ftp: loaded support on port[0] = 21 04:33:18 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, 0x0, 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 753.741294] IPVS: ftp: loaded support on port[0] = 21 04:33:18 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccb"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 753.852648] IPVS: ftp: loaded support on port[0] = 21 04:33:20 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() r4 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000000)={'n\xc7y\x00', 0x0, 0x4, 0x0, [], 0x0, 0x0, 0x0}, &(0x7f0000000080)=0x78) ptrace$setopts(0x4206, r3, 0x0, 0x0) r5 = gettid() tkill(r5, 0x16) 04:33:20 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:20 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:20 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, 0x0, 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:20 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:20 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r4, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) 04:33:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000010c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000000000), 0x4) 04:33:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000010c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clock_nanosleep(0x0, 0x0, 0x0, 0x0) 04:33:21 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0x1}}, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 04:33:21 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, 0x0, 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:21 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:21 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 757.663368] IPVS: ftp: loaded support on port[0] = 21 [ 758.009356] IPVS: ftp: loaded support on port[0] = 21 04:33:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@fat=@flush='flush'}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 04:33:23 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:23 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:23 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d9e3a40f9", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:23 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:23 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000080)={0xa7, 0x3}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() r4 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000000)={'n\xc7y\x00', 0x0, 0x0, 0x0, [], 0xfffffffffffffefa, 0x0, 0x0}, &(0x7f0000001280)=0x3d) ptrace$setopts(0x4206, r3, 0x0, 0x0) r5 = gettid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) r8 = getegid() r9 = socket(0x100001400000010, 0x2, 0x0) write(r9, &(0x7f0000000080)="2400000052001f0014f97407010904000200071008000100010000000800800000000000", 0x54a) getsockopt$inet_IP_IPSEC_POLICY(r9, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000004c0)=0xe8) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r13, 0x0, r12) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r15, 0x0, r14) r16 = socket$netlink(0x10, 0x3, 0x0) r17 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r17, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r17, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r16, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x31}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r18}]]}}}]}, 0x40}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r21 = fcntl$dupfd(r20, 0x0, r19) ioctl$PERF_EVENT_IOC_ENABLE(r21, 0x8912, 0x400200) r22 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)={0x1, 0xfff, 0x1, 0x4, 0x80, 0xffffffffffffffff, 0x5, [], r18, r21, 0x0, 0x1}, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r24, 0x0, r23) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r27 = fcntl$dupfd(r26, 0x0, r25) ioctl$PERF_EVENT_IOC_ENABLE(r27, 0x8912, 0x400200) sendmsg$unix(r7, &(0x7f00000006c0)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000140)="af2be1747d5556310107f78269537f92f52d5271a050c7554aab040df61e8e04a86618f7b45c3907f5410b4577f0fb6532fb139588c617e0b22cea211e05a382eb603dcb45124b59e8d1fddb8fe4f408cd11c6a6c5266d2312d805e4ea0ae83b0762b9b7f44e7571b21927da387d78154818691bd87b21bff519cf928ee1", 0x7e}, {&(0x7f00000001c0)="67d3d946cfb78e47122633961a38f78bc8f594e9678e1d2e03e8022a14", 0x1d}, {&(0x7f0000000200)="91b0103311f40b5f0454865148775d6fa6f61dcfa3b7a0bd7fb5cd4a31d47c68e9540cd1599f445a8b24c7d5767254460736024bda54c6a9347371b2dd4b37a32e5f853ce1f6697bf529bb929707d01e3000141a7ef6051bfdbfc8f9c84d9bfbe888ab9b", 0x64}, {&(0x7f0000000280)="a4cff99906e5e00f5f34388109cb6ab97eff147e7e041b1851ad0bebde520ee63c8acfbd205d12ddf040d19a61854cb4391079477e8d9128794ae672a128bd908d744a29758c25c294f2ef830bda9f4a6a23e02014907dbfcf34d4c77eed8a9e8dbd021de1bca33efe63cee3acf7b319e07c25d8699019f4ded97190ba3cbdb93746f028bff5d45741a5ac008336f5945f20c81dbe6eda664dd7dd4af287578461757bb2312d169a83c4a37ed0116f1789781f632b4c856d2e08259a6c66c68750d394f10e5e577545981c79f7983488934c31a20401e2dc545d7c41bca03b52c29e22a3aaece77f375c4a99d950ed46aa", 0xf1}], 0x4, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {r5, 0x0, r8}}}, @cred={{0x1c, 0x1, 0x2, {r3, r10, r11}}}, @rights={{0x2c, 0x1, 0x1, [r13, r15, r1, r22, r23, 0xffffffffffffffff, r27]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x88, 0x4000060}, 0x800) tkill(r5, 0x16) [ 759.301565] FAT-fs (loop5): bogus number of reserved sectors [ 759.315833] FAT-fs (loop5): Can't find a valid FAT filesystem [ 759.352362] IPv6: sit4: Disabled Multicast RS [ 759.388562] FAT-fs (loop5): bogus number of reserved sectors [ 759.397516] FAT-fs (loop5): Can't find a valid FAT filesystem [ 759.414541] IPv6: sit5: Disabled Multicast RS 04:33:24 executing program 5: r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) rt_sigaction(0x1c, &(0x7f0000000300)={0x0, {}, 0x0, 0x0}, &(0x7f00000003c0)={0x0, {}, 0x0, 0x0}, 0x8, &(0x7f0000000400)) 04:33:24 executing program 5: r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8, 0x9, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 04:33:24 executing program 5: request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xffffffffffffffff) 04:33:24 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'hsr0\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000240)={'caif0\x00', 0x600}) [ 759.589781] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 759.608669] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 759.681296] audit: type=1400 audit(1574224404.271:83): avc: denied { attach_queue } for pid=20946 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=tun_socket permissive=1 04:33:24 executing program 5: 04:33:24 executing program 5: 04:33:24 executing program 5: 04:33:24 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:24 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d9e3a40f9", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:24 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:24 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:26 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:26 executing program 5: 04:33:26 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:26 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d9e3a40f9", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:26 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:27 executing program 5: 04:33:27 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x100001400000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="2400000052001f0014f97407010904000200071008000100010000000800800000000000", 0x54a) openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x200000, 0x0) sendmsg$nl_netfilter(r3, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8008000}, 0xc, &(0x7f00000001c0)={&(0x7f00000012c0)={0xe8a, 0x7, 0x7, 0x200, 0x70bd28, 0x25dfdbfc, {0x0, 0x0, 0x8}, [@typed={0x8, 0x19, @u32=0xfffffffd}, @nested={0x34, 0x38, [@typed={0x14, 0x5d, @ipv6=@local}, @typed={0x8, 0x3b, @u32=0x8}, @typed={0x14, 0x83, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, @generic="aa70cee20f55b7ac3577fc9efaae911e16d438fc426d0e276e1bde23a18cbca702d269500a8f9f7b62baa22dfc446b03fc31dc0cc1e0e029ffe695441ce3e5a454885389999c4afc0e959dfdbe0fb90df468617adf69136942e8d64e9a268a080e481c7e534d60e0bc6f68e29b984cd384b18c57fbc490523db9eb1930ef72757fb264633676e1869b54c6b4cbdc625048f896cd1338f42f9c1adf24a928f4cf77eb4591e974ae70cae81c2ffaf42b5c2e0be403242bb40c2088d17a651b120e1b339b041675f9d95c7c5c5b4656da234398364c8423", @typed={0x14, 0x66, @ipv6=@empty}, @generic="908ef80d1fe68ea144d395bf0164ac7fa859e7a873e2191f7d951e400fc8f33dd3d94c47adb2f9b789b7ac3fe568189cc13d29778a14d23b3cdfe0fc5b12fa8d5f7c83a3e8f0c6daa3f13e8f6caceb441036c755bff021a6391fd0321d718344f4bf603f3ca6698c6a275863dd93605589a6a35c42f7a0f9903191bf82955e39e589edf5a870308d2660d7b37e3fc38b83914e12ebf4c8a88f8e6898483964b9ccef9cf078314270ee2f72c27cceb1f57833dec8af2bbb893767ef6b29a63d74076b593a0758af08ed5f6a194dd172fd9a0042f156909360c43a36ae", @generic="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", @nested={0x3c, 0x2b, [@typed={0x91, 0x2f}, @typed={0x14, 0x7d, @ipv6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, @typed={0x8, 0x3a, @str='\x00'}, @typed={0x4, 0x39}, @typed={0x14, 0x1c, @ipv6=@local}]}]}, 0x1254}, 0x1, 0x0, 0x0, 0x5e57a4afbc797211}, 0x8000) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() r5 = shmget$private(0x0, 0x1000, 0x200, &(0x7f0000ffc000/0x1000)=nil) shmctl$SHM_LOCK(r5, 0xb) shmctl$IPC_RMID(r5, 0x0) r6 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$EBT_SO_GET_ENTRIES(r6, 0x0, 0x83, &(0x7f0000000000)={'n\xc7y\x00', 0x0, 0x0, 0x0, [], 0xfffffffffffffefa, 0x0, 0x0}, &(0x7f0000001280)=0x3d) ptrace$setopts(0x4206, r4, 0x0, 0x0) r7 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x3, 0x2) statx(r7, &(0x7f0000000280)='./file0\x00', 0x0, 0x20, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$TIOCMSET(r10, 0x5418, &(0x7f0000000100)=0x9) tkill(0x0, 0x18) capget(&(0x7f0000000080)={0x20080522, r4}, &(0x7f00000000c0)={0x1, 0x7, 0x181, 0xffff0591, 0x5, 0x7}) 04:33:27 executing program 5: 04:33:27 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() r4 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000000)={'n\xc7y\x00', 0x0, 0x0, 0x0, [], 0xfffffffffffffefa, 0x0, 0x0}, &(0x7f0000001280)=0x3d) ptrace$setopts(0x4206, r3, 0x0, 0x0) r5 = gettid() tkill(r5, 0x16) [ 762.424363] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1799 sclass=netlink_route_socket pig=20992 comm=syz-executor.3 04:33:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) [ 762.913793] IPVS: ftp: loaded support on port[0] = 21 04:33:27 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 763.016243] IPVS: ftp: loaded support on port[0] = 21 04:33:27 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) lchown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r5, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r5, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 763.106055] IPVS: ftp: loaded support on port[0] = 21 04:33:27 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d9e3a40f9", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 763.262397] IPVS: ftp: loaded support on port[0] = 21 04:33:27 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000001000)={{0xa, 0x0, 0x0, @remote}, {0xa, 0x0, 0x0, @dev}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x5c) pwritev(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000001080)="d3d850fb8fdf04b42f4a0a87150be18ab3699fbb0e2a7b4b9b9924e068f9d2d992c53474d7647d3cdfb4c5f292270e851a6205c33cf2054f", 0x38}], 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x40, &(0x7f0000000ffc), 0x4) 04:33:28 executing program 5: creat(&(0x7f0000040800)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000104c0)='.\x00', 0x0, 0x0) faccessat(r0, &(0x7f0000081340)='./file0\x00', 0x1, 0x200) 04:33:28 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001500)='/dev/autofs\x00', 0x0, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) clone(0x1fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f00000000c0), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000180), 0xfe0c) setsockopt$inet_mreq(r0, 0x0, 0x24, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, 0x0, 0xe6) accept4$unix(r2, &(0x7f0000000100)=@abs, &(0x7f0000000080)=0x6e, 0x80000) 04:33:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = dup2(r0, r0) r2 = memfd_create(&(0x7f0000000180)='/Q\xb7\xac\xb6\xa4A\xc5\xa5\xa2[\xdb\x9a\xa7\tl<\x93h\xa4_T\xc5\xbd\xb3\x8bj\x95\x8e\xfb\xe2\xdc\b\xab\x83z\xc2\x8e\x15\xbf\xa7(\x0f\xb2e\xaa\"\xbe\xc2\xf9-v\xb1\xe0z\xac\x10\xc2&\x7f\x14\xebEX\xbb\x0fDp\xd2', 0x3) write(r2, &(0x7f00000004c0)="ff", 0x1) sendfile(r1, r2, &(0x7f0000000140), 0xffff) clone(0x3502001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$addseals(r2, 0x409, 0x8) mknod(&(0x7f0000000280)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = dup2(r1, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) [ 763.591571] [ 763.593729] ============================= [ 763.597882] WARNING: suspicious RCU usage [ 763.602038] 4.14.154 #0 Not tainted [ 763.605661] ----------------------------- [ 763.609806] include/linux/radix-tree.h:238 suspicious rcu_dereference_check() usage! [ 763.618206] [ 763.618206] other info that might help us debug this: [ 763.618206] [ 763.626364] [ 763.626364] rcu_scheduler_active = 2, debug_locks = 1 [ 763.633049] 2 locks held by syz-executor.5/21073: [ 763.637895] #0: (&sb->s_type->i_mutex_key#12){+.+.}, at: [] shmem_add_seals+0x15e/0x1060 [ 763.647916] #1: (&(&mapping->tree_lock)->rlock){-.-.}, at: [] shmem_add_seals+0x334/0x1060 [ 763.658476] [ 763.658476] stack backtrace: [ 763.662972] CPU: 0 PID: 21073 Comm: syz-executor.5 Not tainted 4.14.154 #0 [ 763.669968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 763.679306] Call Trace: [ 763.681889] dump_stack+0x142/0x197 [ 763.685586] ? vprintk_func+0x65/0x159 [ 763.689465] lockdep_rcu_suspicious+0x153/0x15d [ 763.694119] shmem_add_seals+0x9e0/0x1060 [ 763.698256] ? shmem_put_link+0xe0/0xe0 [ 763.702233] shmem_fcntl+0xf7/0x130 [ 763.705846] do_fcntl+0x190/0xe10 [ 763.709282] ? f_getown+0xb0/0xb0 [ 763.712748] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 763.717779] ? selinux_file_fcntl+0x66/0x110 [ 763.722185] ? security_file_fcntl+0x89/0xb0 [ 763.726592] SyS_fcntl+0xd5/0x110 [ 763.730033] ? do_fcntl+0xe10/0xe10 [ 763.734023] do_syscall_64+0x1e8/0x640 [ 763.738936] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 763.744458] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 763.749674] RIP: 0033:0x45a639 [ 763.752867] RSP: 002b:00007f9325f2fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000048 [ 763.760566] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a639 [ 763.767832] RDX: 0000000000000008 RSI: 0000000000000409 RDI: 0000000000000004 [ 763.775085] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 763.782340] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9325f306d4 04:33:28 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d9e3a40f9", @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x2}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 763.789777] R13: 00000000004c1068 R14: 00000000004d3c60 R15: 00000000ffffffff 04:33:28 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) lchown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r5, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r5, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:30 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() r4 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000000)={'n\xc7y\x00\xcf\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0}, &(0x7f0000000080)=0x78) ptrace$setopts(0x4206, r3, 0x0, 0x0) r5 = gettid() tkill(r5, 0x16) 04:33:30 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:30 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:30 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:30 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x2}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:30 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) lchown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r5, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r5, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 765.746474] IPVS: ftp: loaded support on port[0] = 21 04:33:30 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x2}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 765.921776] IPVS: ftp: loaded support on port[0] = 21 04:33:30 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 766.033114] IPVS: ftp: loaded support on port[0] = 21 04:33:30 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 766.129542] IPVS: ftp: loaded support on port[0] = 21 04:33:30 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 766.252018] IPVS: ftp: loaded support on port[0] = 21 04:33:30 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:31 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:33 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) r3 = socket(0x100001400000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="2400000052001f0014f97407010904000200071008000100010000000800800000000000", 0x54a) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x18000008}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r4, 0x400, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x9, 0x9, 0x2, 0x9}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = gettid() r6 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$EBT_SO_GET_ENTRIES(r6, 0x0, 0x83, &(0x7f0000000000)={'n\xc7y\x00', 0x0, 0x0, 0x0, [], 0xfffffffffffffefa, 0x0, 0x0}, &(0x7f0000001280)=0x3d) ptrace$setopts(0x4206, r5, 0x0, 0x0) r7 = gettid() tkill(r7, 0x16) 04:33:33 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:33 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:33 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:33 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:33 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 768.619762] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pig=21175 comm=syz-executor.3 04:33:33 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 769.370668] IPVS: ftp: loaded support on port[0] = 21 04:33:34 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:34 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:34 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) [ 769.447719] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pig=21200 comm=syz-executor.3 04:33:34 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:34 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x2}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:36 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() sendmsg$sock(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)="240cad3a3738ee96bca0218712daca7348c3fb5645562c53056b489655902778f864ad372f215eddcfbc32922b34c02c6897b0a8a0aaa76e5bb2f9683a0b7bd97c0dd188ebf9947b7192b954884b859203e46413b3ef76960e5299717eb0af8e2f9aadf2c3c24184c9e2cc482ca91ec3ff52165cd41581188d97b5e572943f8c7ec84e3a00c7739a036027887cbccf3784b01400c7a9b2d733a1e97a9a08e205a84609d0286142afd028f3f7383d4996fc2a900aec3eee1e7fff206fa22faefbf48c46d05c96f63a98d24cb6269217fa1655d58815e07facca1724d3376a69097a93dbdf7e27efcba9ea6f1042c63447c8d8e35e", 0xf4}, {&(0x7f0000000180)="79b26a7d7473d9e9e711c038542a2721133f65011801fdb514595054d6409c922055042ab5e2f1040bb098025c02efe078fe0ba08559c2dfdb17e9ca52b1abc2f20ed16c05423cf74b8d7d890e75514b8904ac58b7a4c357533d5756a70bd679c87c60533cbf754fd6a5", 0x6a}, {&(0x7f0000000200)="05050710e0b61be859f3620297eb641dc7900bd92b5c1ab594a7d658c05a599ec1111a46a43d86f5e909a3c9f20714e774e45ae1106ac95d787e0ea104e005d326465131bd690b12727952b857f5772d9603f29eb222be03b84ae52a95e8a2407b6af7d4b9e2a580ece1c4c94293a60c6fbb26848ebed0b4e259a9e157ba8299db592a658a374bc5417029dc01dde2bf5878d86aea7c3cd9211a1f284d78cc", 0xfffffffffffffff0}, {&(0x7f00000012c0)="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", 0x1000}, {&(0x7f00000002c0)="7b5b52f0eb30b155bc1c0be5cbbd67166f87fc604becc4eabef9460ea02b9da55f565e79a0f09153a91d9d0659d8a48a617fcfe9716d39f5eab77fe7b496f1883395bb7cab4562282d2b6146943cfb713b472535fcdf0e99cbc5b8d602383d679b3092542ff09b3d6d2f8456a5449ee52a4df4036dfe54c6a88c9984028237ba7ce2c4883932f2b433c55a02c2714b89c6eff5", 0x93}, {&(0x7f0000000380)="88be0762dc35d00a1e085df58f3b848565e5a9547854fbd30e88ff953d549ae7b5d3d311c88efdbabb1eab22958c5de164d2e2464bb00cb2067783b8b5ec3b31924be2e755cd94a1b5986eeebc252d614471f0821e94489aaf309a55dac9efebf3a0697cebaeb0a127fd532af6d1423876b9190c75f900e64785fbcacdc0b89c2bf2405686dcc402f7d19f2baa8fe5658c", 0x91}, {&(0x7f0000000440)='\x00 \x00', 0x3}, {&(0x7f0000000480)}], 0x8}, 0x1) r4 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000000)={'n\xc7y\x00', 0x0, 0x0, 0x0, [], 0xfffffffffffffefa, 0x0, 0x0}, &(0x7f0000001280)=0x3d) ptrace$setopts(0x4206, r3, 0xcb0, 0x0) r5 = gettid() tkill(r5, 0x16) 04:33:36 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84735d99f76cf404c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3ca3f0f698c4963760b503e377a50ade664e314541cb65eef58fa10f6c8c1023df653116d6564a7d8d30a98b90176573f389b1fb1ebe02de41a60fe7e33299b763433d322cd7a008c9f6601179bab760a085610a89a26b04d6a27ba1ffffa885fb2296d3ea8c4e74254681fe6ad2baa88d9509eeb958779865aa8a44e478df7cbf9dfad555daa483a539b64ea0cbc88614cd4b37a56c6a6130137e1408bd9a84258aafd0c38d2f7d14fa8bd6fdc352443a3d9e3a40f9", @ANYRES32, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:36 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x2}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:36 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:36 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:36 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:37 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe595020000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r5) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, 0x0, r5}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:37 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', 0x0, r6) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r6}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:37 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt(r2, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe59502000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000200)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) fstat(r5, 0x0) lchown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={r3, r4}, 0xc) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x1}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r6, 0x0, 0xffffff99, 0x401) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000000380)) socket$inet_sctp(0x2, 0x1, 0x84) 04:33:37 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDR