00b0000000a001a00ffffffffffff00000a0006000802110000010000"], 0x38}, 0x1, 0x0, 0x0, 0x4048000}, 0x0) keyctl$revoke(0x3, r0) 19:21:42 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) r2 = dup(r1) r3 = getpid() write$cgroup_pid(r2, &(0x7f0000000140)=r3, 0x12) 19:21:42 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_POWER(r2, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:42 executing program 3: r0 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="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", 0x4d9, 0xffffffffffffffff) keyctl$revoke(0x3, r0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000600)={&(0x7f00000000c0)=@delneigh={0x2c, 0x1d, 0x100, 0x70bd28, 0x25dfdbfc, {0x1c, 0x0, 0x0, 0x0, 0x19, 0xa9, 0x2}, [@NDA_SRC_VNI={0x8, 0xb, 0x5}, @NDA_PROBES={0x8, 0x4, 0x73}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40044000}, 0x900) 19:21:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x5f, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300", @ANYRES32=r3, @ANYBLOB], 0x1c}}, 0x0) prctl$PR_GET_NO_NEW_PRIVS(0x27) read$midi(0xffffffffffffffff, &(0x7f0000002040)=""/4097, 0x1001) 19:21:42 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) r2 = dup(r1) r3 = getpid() write$cgroup_pid(r2, &(0x7f0000000140)=r3, 0x12) 19:21:42 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000080), 0x0) 19:21:42 executing program 3: accept$inet(0xffffffffffffffff, &(0x7f0000000640)={0x2, 0x0, @remote}, &(0x7f0000000680)=0x10) r0 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="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", 0x4d9, 0xffffffffffffffff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) poll(&(0x7f0000002080)=[{r1}], 0x1, 0x5c) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup2(r2, r1) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) poll(&(0x7f0000002080)=[{r4}], 0x1, 0x5c) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = dup2(r5, r4) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000006c0)={0x9ce2, 0x3, 0x4, 0x400, 0x3, {0x77359400}, {0x2, 0x2, 0x4, 0x20, 0x2, 0xfd, "7c2adc20"}, 0x6, 0x7, @userptr=0x8, 0x80, 0x0, r6}) keyctl$revoke(0x3, r0) ioctl$BTRFS_IOC_INO_PATHS(0xffffffffffffffff, 0xc0389423, &(0x7f0000000040)={0x8, 0x40, [0x1, 0x4, 0x1, 0x5], &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000600)='tls\x00', 0x4) 19:21:42 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000080), 0x0) 19:21:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300", @ANYRES32=r3, @ANYBLOB], 0x1c}}, 0x0) read$midi(0xffffffffffffffff, &(0x7f0000002040)=""/4097, 0x1001) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) poll(&(0x7f0000002080)=[{r4}], 0x1, 0x5c) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = dup2(r5, r4) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) sendmsg$IPVS_CMD_SET_DEST(r6, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x40, 0x0, 0x800, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xcec3}]}, 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x880) 19:21:42 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:42 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) r2 = dup(r1) r3 = getpid() write$cgroup_pid(r2, &(0x7f0000000140)=r3, 0x12) 19:21:43 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000080), 0x0) 19:21:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYRESDEC, @ANYRESHEX, @ANYBLOB="9d0b00000000000000000c00000008000300", @ANYRES32=r2, @ANYBLOB], 0x1c}}, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x2, 0x10}, 0xc) read$midi(0xffffffffffffffff, &(0x7f0000002040)=""/4097, 0x1001) 19:21:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300", @ANYRES32=r3, @ANYBLOB], 0x1c}}, 0x0) read$midi(0xffffffffffffffff, &(0x7f0000002040)=""/4097, 0x1001) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) poll(&(0x7f0000002080)=[{r4}], 0x1, 0x5c) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = dup2(r5, r4) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) sendmsg$IPVS_CMD_SET_DEST(r6, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x40, 0x0, 0x800, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xcec3}]}, 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x880) 19:21:43 executing program 3: r0 = add_key(&(0x7f0000000080)='logon\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000100)="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", 0x4d9, 0xffffffffffffffff) keyctl$revoke(0x3, r0) 19:21:43 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) 19:21:43 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) r2 = dup(r1) r3 = getpid() write$cgroup_pid(r2, &(0x7f0000000140)=r3, 0x12) 19:21:43 executing program 3: r0 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="e9732af69a355544cecb8f7a403138df480158364dfc0bc118710d801669943f01e3cb332f6b8bbeaa133d43a6e992201c8d9b16aa387e841f8de0f68aa3a15d95475cded0860ba450f24b479824ddc0ee5e59fa0b38e3e215d14161752ff0fdcc5d3c70f7d749d7f8dd2a691d6b008b207af750bb72a0cbdd966bc5d4ce4f13760e502996c83cb2b26c3c1a4cf788acb0335f9d3a2f49e5505d389a89141aeff9a76648e728e038331aacd4625972fa1e7ee53db4af796392583e2b46332ead1ca64b1a61c6c54a037fa664fec474ff368f5e86b362e89be77e7eedd328d2ac730df42cf3e12035e1a6d9aceb14813b0d2d2fcc31ea1114831fdd5f8eea79a8061edd8e981c3931b16251fb3270d63d08a98704a4d34553dd649055d20c6b2fd40221e30cd848bed217cb955fdb677cf26906ecf01985ef5088a5eee9f4cdc4a5a487b11b8ab2f3fe2a20dbebc2517778f4b760d1bc5843d41d560fe5a03da209146c2746e1f6d74f5e4a375d764d902c1a0d7f9e2e5321b675006cef60828b37d53b96a3f6d0d0156666c058c2137319966e411e5a700e7e75b7df697d765c00201d2620634a95371378bdf763346dedd41784b13712afa071914c46120ce5c44639d0dd2df7b48eba97f343ae4a3420efaf5a51204fe6f5153358e2e5deb22c8d27649aeb5cffdd86dfd8e280d3c153a0da45d876aa9552f946ae7e106b3052dbfed090eeb2ef0285cc537c40df60b09ba3088d3a56b16358a46921dfa050de3d47b99219c4ad8cfb120c33235fbc38aa95122c7957e707274dd5d1c3ba5fad3a65deed790b66a8b6defa5f66c1470df6ce113a3e10882ef96f5cc158a43aeaa3eb51962600260f639897411e8086a4624bba2452a30f495ddf61a0f1b64e73f84e3ceb29ecfd35f3b8a65582809f19d3ebe6cf217bef5ef65df063f91fa9ba75743fc82afec000cabd4f03463d64bb591b295f03465f677874edece76001cb29450e5bfa0f0b8ccadaaeb8479d2c60bb97f4427df9d44afa7f6bc193c2c043701945238ed30152312f7f4f6b918ee58c2b6294e4d0ad5d162069edfc70cd69b9e8c16eb8afddb0fecda907f10b89af3819b27f0a52454741b01387abedfc06fbb604ce528559310abda22d95dfd7e03cc4fb1b7bb4ab2b0ae9e53405cfd2c92cd789f34daf388ee0d339e952ffc88ddd0697c8ff8d8e8585166de5d90ec866ea85672d7370c1ea7ff4a2cc9796ace372a89024db79de8b9fb86ba3ac4d5488c54558926c10762615f23f3c076ea8b77ae43e5670183c86dae1a29b23462643a18507718215791a7ed248b2b570989e72d546fb206dd2de57d9a2ef41e947792880620b56db96beb1b0d16439778d1bd8a9e33caf1cc5808c36c90e3bd3d5029c523aeb124e0f3bb1bbd72ed506db57b1b2389f939c5277091198fdc6c892af03b24bc5de7907c1d5d317cc22695da2803e9af981674f4e414b14bc13d7cfcfe808f6e077bee1ffdf34f3c1d1e00eebb55608251e387a6e64629f880c480c6408a05fe6787a92320ae3cb6608c72373a472af009de30132d58f5249548351a48cad96867bee901352d992aec439be6309f212a18425d31a8ee816826ce874ea2b2c3aa9e98805d99dacec8e036986ff1dd772d2ea54179d74eac302f6671ce31d58d2b761d6c0f365d541085d6a531c11b2bf45810a43728ada93a156ef5b3b89c46b6cfc477d3677ee1ac06fc78da9c5e2a4b4ae6524f3", 0x4d9, 0xffffffffffffffff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) poll(&(0x7f0000002080)=[{r1}], 0x1, 0x5c) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup2(r2, r1) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) poll(&(0x7f0000002080)=[{r5}], 0x1, 0x5c) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = dup2(r6, r5) ioctl$sock_inet_SIOCSIFADDR(r7, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) openat$incfs(r7, &(0x7f0000000980)='.log\x00', 0x501000, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000780)={'syztnl0\x00', &(0x7f00000009c0)=ANY=[@ANYBLOB='tunl0\x00'/16, @ANYRES32=0x0, @ANYBLOB="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"]}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000000840)={'ip6tnl0\x00', &(0x7f00000007c0)={'syztnl1\x00', r8, 0x2f, 0x6, 0x8, 0xbb, 0x0, @local, @loopback, 0x20, 0x700, 0x20, 0x8}}) ioctl$VIDIOC_G_FMT(r4, 0xc0d05604, &(0x7f0000000880)={0x1, @sdr={0x56595559, 0x3}}) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) write$P9_RVERSION(r3, &(0x7f0000000000)={0x13, 0x65, 0xffff, 0x8, 0x6, '9P2000'}, 0x13) keyctl$revoke(0x3, r0) 19:21:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x4, 0x0, 0x0, 0x0, 0x8, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300", @ANYRES32=r3, @ANYBLOB], 0x1c}}, 0x0) read$midi(0xffffffffffffffff, &(0x7f0000000640)=""/4113, 0x1011) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001680)='/dev/dlm-monitor\x00', 0x8c080, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000016c0)={0x0, 0x8, 0x7, [0x8, 0x7, 0x7fff, 0xff, 0x2, 0x3f, 0x1ff]}, &(0x7f0000001700)=0x16) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000001740)={r5, @in={{0x2, 0x4e23, @rand_addr=0x64010100}}, 0x0, 0x6, 0x6cd, 0xdc8, 0x10, 0x9}, &(0x7f0000001800)=0x9c) ioctl$SNDRV_PCM_IOCTL_WRITEN_FRAMES(0xffffffffffffffff, 0x40184152, &(0x7f0000000600)={0x0, &(0x7f00000005c0)=[&(0x7f0000000240)="19c3753fdaef07642445ce8e4afdbbdc072e46b43e3ff23dfe2bbe223453b6adc6355e7877625995e1670d1f3a7c09ff2021b6bf06cb1b438d9cafad46a170aed5aa816de887330d29b593a985de995f4910b89438e68b065df87f75ad7151d0c5c3a8ba466128d1bfe3c62c0d9116245c142901d0fb110c9438121ee33478bea0a987ed3bfb51c5f4fb6779", &(0x7f0000000300)="754851425b2df6d8b29abdfb23a9bc4847f6f36914c45b61c68d83e63dc874e9f800e7503ae6d768747f046e3dcf64412d1f7cd2068bc3020082feb138ecf9181ad6b235e08df8a5868f", &(0x7f0000000380)="11", &(0x7f00000003c0)="22ea42f618b74f1c0cbe0ecbef251a931a99b93a55668257f4a8c4197ead2a6c5d17d6a17a2219fabda26d87955b6e7c07faea8b7da579d6cf9d6a4862dcafd498dc5c3eddf7888f92b2fbcdcf8ed60979bb4687e6e02b693d987d6e8281b60709ea98209d377765d1167fa0f816d7ae5c9ae724475aa654a64eeee3310453eb893422d1de327c806ce71dea91429ea1a6e330fd6593ffd314967a4726bfd16028132eedc1159a0bd3d0e490fe5f2f922ffb4547c33d0aeafb3f8b20c556b089bedd0a2ceb51ef40164292fffd4a680f064737bf89b7ed5184c1c17a7c1c2757a7f4fd125ef212fcf6a10c1f", &(0x7f00000004c0)="22b6813993b34845e2c0f4e3ec35ad10de0724134e5890489242817e016f248149fd339cef910213ee17567f21a90bfb3e6f6a7dc4", &(0x7f0000000500)="2c3d5480980cc9b4dcd8c5f66b7f424310f06688bc84f9b8f28b66dc1a76f2d4fd4760a8edb9544c5d30947f6b57f63a2e5fcb1e9180e88d4ffb08c986459d17d96c780d9ead028107da59524d", &(0x7f0000000580)="70b6cbe639900ca2f171d2dac1144fbecb9974dd39e1ede05a1acfe96110d16f"], 0x3ff}) 19:21:43 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:43 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:43 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) 19:21:43 executing program 3: r0 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="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", 0x4d9, 0xffffffffffffffff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) poll(&(0x7f0000002080)=[{r1}], 0x1, 0x5c) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup2(r2, r1) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) read$usbmon(r3, &(0x7f0000000a80)=""/4096, 0x1000) keyctl$revoke(0x3, r0) sendmsg$AUDIT_ADD_RULE(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000040)={&(0x7f0000001a80)=ANY=[@ANYBLOB="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"], 0x424}, 0x1, 0x0, 0x0, 0x4004000}, 0x4000) 19:21:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) poll(&(0x7f0000002080)=[{r2}], 0x1, 0x5c) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) setsockopt$TIPC_GROUP_LEAVE(r4, 0x10f, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="9d0b00000000000000000c00000008000300", @ANYRES32=r5, @ANYBLOB="ed6e970db79b7ca8e8b5421eecc8f50c81"], 0x1c}}, 0x0) read$midi(0xffffffffffffffff, &(0x7f0000002040)=""/4097, 0x1001) 19:21:43 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:43 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300", @ANYRES32=r3, @ANYBLOB], 0x1c}}, 0x0) read$midi(0xffffffffffffffff, &(0x7f0000002040)=""/4097, 0x1001) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000100)={0x6cb, 0x0, 0xba, 0x204}) 19:21:44 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000340)=@random={'user.', '\x00'}, &(0x7f0000000380)='batadv\x00', 0x7, 0x3) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="00000800322a29b674b3896ea9075465a4b25de1c07299a94859dee7d8cc80ced8c8349efe567aa8d34201e11de6345d5dc8aae451a983eca66a84a07a0a8b07aba286d6f02120032cd5cdcf6f305134545604d51d0ec1d054ef571514e11e0a8637ed55a1b24dd53db6306c9c5f5752211e2e69a71ae38fdd46642a1f85e906ff270c14e7fc399d6d63a2f2497a60115ba49698939e14e875aa44b3119c62245fe33a65bd119aefb35bd1bb456ee5595c1ddffe2c490f3ede3c29762b29040c647f5763102821c4f565f2f90b81f21b0e6dd0e4b13bc0ddfe063f525a90f6526aa7eac59bb3a5b93f13b90355263e35aa7860c9716b59e57bb43359874bd7da025204", @ANYRES16=r2, @ANYBLOB="9d0b7a175d470000000047d382be000008000310", @ANYRES32=r3, @ANYBLOB], 0x1c}}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000240)={0x0, 0xc3, "cfdcc398b46b4f297539c27358f9da2c7b70060cfe1c957dfe777577e24179aba6458197eefc826406d8dbf899cb9d8fb2332e7149e5f9fef9618e8f4099fc9462bf632f470b75495e76003e7333dadb0f74a979763a2a9943583f425dd7b3af0be898cc71ab8070d262fdef5246d1b7806eeb27d106d4415f409fcc85db752f4a1794ec7d084b199c4687e6ed14059ca32ffa1e510f9f61da71b15ce0117f3b14a79f56f3b48d2fd2825d2979a8f31a3bba780f9b9bc4343c81e6c1c7746cf1b75ff6"}, &(0x7f0000000100)=0xcb) read$midi(0xffffffffffffffff, &(0x7f0000002040)=""/4097, 0x1001) 19:21:44 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:44 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r5 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x3f, 0xc0080) poll(&(0x7f0000000240)=[{}, {r5, 0x4463}, {0xffffffffffffffff, 0x8008}, {0xffffffffffffffff, 0x1020}, {r0, 0x22}], 0x5, 0xb) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = dup2(r6, r4) ioctl$sock_inet_SIOCSIFADDR(r7, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) ioctl$SNDCTL_SEQ_GETOUTCOUNT(r7, 0x80045104, &(0x7f0000000100)) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="9d0b00000000000000000c00000008000300", @ANYRES32=r8, @ANYBLOB], 0x1c}}, 0x0) read$midi(0xffffffffffffffff, &(0x7f0000002040)=""/4097, 0x1001) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = dup2(r9, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFADDR(r10, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) setsockopt$bt_l2cap_L2CAP_CONNINFO(r10, 0x6, 0x2, &(0x7f0000000280)={0x20, "b2f081"}, 0x6) 19:21:44 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:44 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:44 executing program 3: r0 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="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", 0x4d9, 0xffffffffffffffff) keyctl$revoke(0x3, r0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) 19:21:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) ioperm(0x10000, 0x7fff, 0xfffffffffffffff9) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="09000400c2d56730e4d927746537b442b8caa652fb8b9075a119591d", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300", @ANYRES32=r3, @ANYBLOB], 0x1c}}, 0x0) read$midi(0xffffffffffffffff, &(0x7f0000002040)=""/4097, 0x1001) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) poll(&(0x7f0000002080)=[{r4}], 0x1, 0x5c) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000280)='/dev/bsg\x00', 0x68800, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000300)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r6, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x28, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0x8, 0x3, r7}, @val={0xc, 0x99, {0x5, 0x4b}}}}, ["", "", "", "", "", ""]}, 0x28}}, 0x0) r8 = dup2(r5, r4) ioctl$sock_inet_SIOCSIFADDR(r8, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r8, 0xc02064b9, &(0x7f0000000240)={&(0x7f0000000140)=[0x6, 0x0, 0x7], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x1e68, 0xbbbbbbbb}) 19:21:44 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:44 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) 19:21:44 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:44 executing program 3: r0 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="e9732af69a355544cecb8f7a403138df480158364dfc0bc118710d801669943f01e3cb332f6b8bbeaa133d43a6e992201c8d9b16aa387e841f8de0f68aa3a15d95475cded0860ba450f24b479824ddc0ee5e59fa0b38e3e215d14161752ff0fdcc5d3c70f7d749d7f8dd2a691d6b008b207af750bb72a0cbdd966bc5d4ce4f13760e502996c83cb2b26c3c1a4cf788acb0335f9d3a2f49e5505d389a89141aeff9a76648e728e038331aacd4625972fa1e7ee53db4af796392583e2b46332ead1ca64b1a61c6c54a037fa664fec474ff368f5e86b362e89be77e7eedd328d2ac730df42cf3e12035e1a6d9aceb14813b0d2d2fcc31ea1114831fdd5f8eea79a8061edd8e981c3931b16251fb3270d63d08a98704a4d34553dd649055d20c6b2fd40221e30cd848bed217cb955fdb677cf26906ecf01985ef5088a5eee9f4cdc4a5a487b11b8ab2f3fe2a20dbebc2517778f4b760d1bc5843d41d560fe5a03da209146c2746e1f6d74f5e4a375d764d902c1a0d7f9e2e5321b675006cef60828b37d53b96a3f6d0d0156666c058c2137319966e411e5a700e7e75b7df697d765c00201d2620634a95371378bdf763346dedd41784b13712afa071914c46120ce5c44639d0dd2df7b48eba97f343ae4a3420efaf5a51204fe6f5153358e2e5deb22c8d27649aeb5cffdd86dfd8e280d3c153a0da45d876aa9552f946ae7e106b3052dbfed090eeb2ef0285cc537c40df60b09ba3088d3a56b16358a46921dfa050de3d47b99219c4ad8cfb120c33235fbc38aa95122c7957e707274dd5d1c3ba5fad3a65deed790b66a8b6defa5f66c1470df6ce113a3e10882ef96f5cc158a43aeaa3eb51962600260f639897411e8086a4624bba2452a30f495ddf61a0f1b64e73f84e3ceb29ecfd35f3b8a65582809f19d3ebe6cf217bef5ef65df063f91fa9ba75743fc82afec000cabd4f03463d64bb591b295f03465f677874edece76001cb29450e5bfa0f0b8ccadaaeb8479d2c60bb97f4427df9d44afa7f6bc193c2c043701945238ed30152312f7f4f6b918ee58c2b6294e4d0ad5d162069edfc70cd69b9e8c16eb8afddb0fecda907f10b89af3819b27f0a52454741b01387abedfc06fbb604ce528559310abda22d95dfd7e03cc4fb1b7bb4ab2b0ae9e53405cfd2c92cd789f34daf388ee0d339e952ffc88ddd0697c8ff8d8e8585166de5d90ec866ea85672d7370c1ea7ff4a2cc9796ace372a89024db79de8b9fb86ba3ac4d5488c54558926c10762615f23f3c076ea8b77ae43e5670183c86dae1a29b23462643a18507718215791a7ed248b2b570989e72d546fb206dd2de57d9a2ef41e947792880620b56db96beb1b0d16439778d1bd8a9e33caf1cc5808c36c90e3bd3d5029c523aeb124e0f3bb1bbd72ed506db57b1b2389f939c5277091198fdc6c892af03b24bc5de7907c1d5d317cc22695da2803e9af981674f4e414b14bc13d7cfcfe808f6e077bee1ffdf34f3c1d1e00eebb55608251e387a6e64629f880c480c6408a05fe6787a92320ae3cb6608c72373a472af009de30132d58f5249548351a48cad96867bee901352d992aec439be6309f212a18425d31a8ee816826ce874ea2b2c3aa9e98805d99dacec8e036986ff1dd772d2ea54179d74eac302f6671ce31d58d2b761d6c0f365d541085d6a531c11b2bf45810a43728ada93a156ef5b3b89c46b6cfc477d3677ee1ac06fc78da9c5e2a4b4ae6524f3", 0x4d9, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xd8, 0x2, 0x8, 0x301, 0x0, 0x0, {}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x809b}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x60}, @CTA_TIMEOUT_DATA={0x34, 0x4, 0x0, 0x1, @udp=[@CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x3}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x3ff}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x2}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x4}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x3ad3}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_DATA={0x3c, 0x4, 0x0, 0x1, @udp=[@CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x12d7}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x8001}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x3}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0xffff395b}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x6}]}, @CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @icmpv6=[@CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x3f}]}, @CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @udp=[@CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x6}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0xd8}, 0x1, 0x0, 0x0, 0x40000}, 0x4) keyctl$revoke(0x3, r0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f0000000000)=""/68) 19:21:44 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:44 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:44 executing program 3: r0 = add_key(&(0x7f0000000000)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000600)="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", 0x4d9, 0xffffffffffffffff) keyctl$revoke(0x3, r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) poll(&(0x7f0000002080)=[{r1}], 0x1, 0x5c) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup2(r2, r1) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000040)=0x7, 0x4) 19:21:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300", @ANYRES32=r3, @ANYBLOB="5a379238b39c070af2f244af"], 0x1c}}, 0x0) r4 = socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000100)=0x3, 0x4) read$midi(0xffffffffffffffff, &(0x7f0000002040)=""/4097, 0x1001) 19:21:45 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100)="d003ed14afad1aacc3a7a731d44f42b976da5edf48cf0aff7603a8", 0x1b, 0x42, &(0x7f0000000140)={0xa, 0x4e23, 0xfffffffa, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300", @ANYRES32=r3, @ANYBLOB], 0x1c}}, 0x0) read$midi(0xffffffffffffffff, &(0x7f0000002040)=""/4097, 0x1001) 19:21:45 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) 19:21:45 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:45 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:45 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:45 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:45 executing program 0: getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:45 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:45 executing program 3: r0 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="e9732af69a355544cecb8f7a403138df480158364dfc0bc118710d801669943f01e3cb332f6b8bbeaa133d43a6e992201c8d9b16aa387e841f8de0f68aa3a15d95475cded0860ba450f24b479824ddc0ee5e59fa0b38e3e215d14161752ff0fdcc5d3c70f7d749d7f8dd2a691d6b008b207af750bb72a0cbdd966bc5d4ce4f13760e502996c83cb2b26c3c1a4cf788acb0335f9d3a2f49e5505d389a89141aeff9a76648e728e038331aacd4625972fa1e7ee53db4af796392583e2b46332ead1ca64b1a61c6c54a037fa664fec474ff368f5e86b362e89be77e7eedd328d2ac730df42cf3e12035e1a6d9aceb14813b0d2d2fcc31ea1114831fdd5f8eea79a8061edd8e981c3931b16251fb3270d63d08a98704a4d34553dd649055d20c6b2fd40221e30cd848bed217cb955fdb677cf26906ecf01985ef5088a5eee9f4cdc4a5a487b11b8ab2f3fe2a20dbebc2517778f4b760d1bc5843d41d560fe5a03da209146c2746e1f6d74f5e4a375d764d902c1a0d7f9e2e5321b675006cef60828b37d53b96a3f6d0d0156666c058c2137319966e411e5a700e7e75b7df697d765c00201d2620634a95371378bdf763346dedd41784b13712afa071914c46120ce5c44639d0dd2df7b48eba97f343ae4a3420efaf5a51204fe6f5153358e2e5deb22c8d27649aeb5cffdd86dfd8e280d3c153a0da45d876aa9552f946ae7e106b3052dbfed090eeb2ef0285cc537c40df60b09ba3088d3a56b16358a46921dfa050de3d47b99219c4ad8cfb120c33235fbc38aa95122c7957e707274dd5d1c3ba5fad3a65deed790b66a8b6defa5f66c1470df6ce113a3e10882ef96f5cc158a43aeaa3eb51962600260f639897411e8086a4624bba2452a30f495ddf61a0f1b64e73f84e3ceb29ecfd35f3b8a65582809f19d3ebe6cf217bef5ef65df063f91fa9ba75743fc82afec000cabd4f03463d64bb591b295f03465f677874edece76001cb29450e5bfa0f0b8ccadaaeb8479d2c60bb97f4427df9d44afa7f6bc193c2c043701945238ed30152312f7f4f6b918ee58c2b6294e4d0ad5d162069edfc70cd69b9e8c16eb8afddb0fecda907f10b89af3819b27f0a52454741b01387abedfc06fbb604ce528559310abda22d95dfd7e03cc4fb1b7bb4ab2b0ae9e53405cfd2c92cd789f34daf388ee0d339e952ffc88ddd0697c8ff8d8e8585166de5d90ec866ea85672d7370c1ea7ff4a2cc9796ace372a89024db79de8b9fb86ba3ac4d5488c54558926c10762615f23f3c076ea8b77ae43e5670183c86dae1a29b23462643a18507718215791a7ed248b2b570989e72d546fb206dd2de57d9a2ef41e947792880620b56db96beb1b0d16439778d1bd8a9e33caf1cc5808c36c90e3bd3d5029c523aeb124e0f3bb1bbd72ed506db57b1b2389f939c5277091198fdc6c892af03b24bc5de7907c1d5d317cc22695da2803e9af981674f4e414b14bc13d7cfcfe808f6e077bee1ffdf34f3c1d1e00eebb55608251e387a6e64629f880c480c6408a05fe6787a92320ae3cb6608c72373a472af009de30132d58f5249548351a48cad96867bee901352d992aec439be6309f212a18425d31a8ee816826ce874ea2b2c3aa9e98805d99dacec8e036986ff1dd772d2ea54179d74eac302f6671ce31d58d2b761d6c0f365d541085d6a531c11b2bf45810a43728ada93a156ef5b3b89c46b6cfc477d3677ee1ac06fc78da9c5e2a4b4ae6524f3", 0x4d9, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x5) keyctl$revoke(0x3, r0) r1 = add_key(&(0x7f0000001600)='rxrpc_s\x00', &(0x7f0000001640)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="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", 0x4d9, r1) keyctl$revoke(0x3, r2) socket$inet_icmp(0x2, 0x2, 0x1) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000040)={r2, 0x1000, 0xd3}, 0x0, &(0x7f0000000600)="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", &(0x7f0000001700)=""/211) 19:21:45 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:45 executing program 0: getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:45 executing program 3: r0 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="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", 0x4d9, 0xffffffffffffffff) keyctl$revoke(0x3, r0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000004}, 0xc, &(0x7f0000000040)={&(0x7f0000000600)={0x1ac, 0x0, 0x10, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0xb4, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x652f5f16}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xfff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xff}]}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x80}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xae}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xff}, @TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x80000000}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x113280}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xbbd}]}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x8000}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}]}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x40}, @TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3}]}, @TIPC_NLA_SOCK={0x10, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}]}]}, @TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x54, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x716}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7b}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc335}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x1ac}, 0x1, 0x0, 0x0, 0x40800}, 0x810) 19:21:45 executing program 0: getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:45 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) 19:21:45 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:45 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:45 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:45 executing program 3: r0 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="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", 0x4d9, 0xffffffffffffffff) keyctl$revoke(0x3, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000640)='logon\x00', &(0x7f0000000680)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f00000006c0)={0x0, "f8845b9c91896bdad0ef795ed64a7ddeafadd209e2eadd12e7caa81d64ee39d2f89f370c8d32bae8a8e3d4f2cda7734056b169927ca6c15538bb778b5d4c85c9", 0x37}, 0x48, r0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000001a40)={{0x0, @empty, 0x4e20, 0x1, 'sed\x00', 0x14, 0x6, 0x4}, {@broadcast, 0x4e24, 0x1, 0x4, 0xfffffc01, 0x7}}, 0x44) request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000600)='big_key\x00', r1) r2 = syz_mount_image$cramfs(&(0x7f0000000740)='cramfs\x00', &(0x7f0000000780)='./file0\x00', 0x1f48, 0x3, &(0x7f0000001900)=[{&(0x7f00000007c0)="d263501821f027be7ebf00d86fb4f24825e7e526a91037f7debc68a7c0e5da8f6a34609cd1fb0b6f6facf7252abbe691bca59c7d9aa372d17055743bc812ea99e99bc090e2849aec52df8bc2e98817339476", 0x52, 0x6}, {&(0x7f0000000840)="8e870db7b534ae6c07a37c0f9bb23c36cf3cbf11ee15ff2d7e4498ed0b55b81026d73951c06578e5b5dfadc8b154325b847975f69c67c1141108016a4b0b7f0130a4571714c8e70a606a99d53b897af8c2e8b6b58c171f02a9fd738331fe62752818f75c831964707fd50b2cef4c62df69cba774fca3fd8397bf341cf9ae8defa0836d72e502945d3fd4932ccdc846ea46620aba03398d31f68be02b93e171ca7b1d9df1fa41a09782e3ce7ec4", 0xad, 0x2}, {&(0x7f0000000900)="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", 0x1000, 0x100000000}], 0x88c00, &(0x7f0000001980)={[{'logon\x00'}, {'.]'}, {'logon\x00'}, {'fscrypt:'}, {'fscrypt:'}], [{@seclabel='seclabel'}]}) renameat(r2, &(0x7f0000001ac0)='./file0\x00', r2, &(0x7f0000001a00)='./file0\x00') 19:21:45 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:45 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:45 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:45 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:45 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:45 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:45 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:45 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) getpid() 19:21:45 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:45 executing program 3: r0 = add_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000000)={'syz', 0x0}, &(0x7f0000000100)="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", 0x4d9, 0xffffffffffffffff) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000080)={0x6d, 0x7d, 0x1, {{0x0, 0x55, 0x8, 0x2, {0x4, 0x3}, 0x100000, 0x3, 0x7, 0x58, 0xb, '+\\@{&}!}-}&', 0x7, '@#}-:#\'', 0x8, 'big_key\x00', 0x8, 'big_key\x00'}, 0x3, '\\++', 0xee00, 0xffffffffffffffff, 0xee01}}, 0x6d) keyctl$revoke(0x3, r0) 19:21:45 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:46 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:46 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:46 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000040)='logon\x00', &(0x7f0000000080)={'fscrypt:', @desc4='85baa174f0cb1142'}, &(0x7f0000000600)={0x0, "504a1a43abe03e426b85efd580f7a9e0748a413d85960a84477a8c5ab7b36f0d6efa5e68cc464db127b36c5a7723a538e803d1a243dbdded9b162dca298ba56b", 0x2c}, 0x48, 0xffffffffffffffff) r1 = add_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="e9732af69a355544cecb8f7a403138df480158364dfc0bc118710d801669943f01e3cb332f6b8bbeaa133d43a6e992201c8d9b16aa387e841f8de0f68aa3a15d95475cded0860ba450f24b479824ddc0ee5e59fa0b38e3e215d14161752ff0fdcc5d3c70f7d749d7f8dd2a691d6b008b207af750bb72a0cbdd966bc5d4ce4f13760e502996c83cb2b26c3c1a4cf788acb0335f9d3a2f49e5505d389a89141aeff9a76648e728e038331aacd4625972fa1e7ee53db4af796392583e2b46332ead1ca64b1a61c6c54a037fa664fec474ff368f5e86b362e89be77e7eedd328d2ac730df42cf3e12035e1a6d9aceb14813b0d2d2fcc31ea1114831fdd5f8eea79a8061edd8e981c3931b16251fb3270d63d08a98704a4d34553dd649055d20c6b2fd40221e30cd848bed217cb955fdb677cf26906ecf01985ef5088a5eee9f4cdc4a5a487b11b8ab2f3fe2a20dbebc2517778f4b760d1bc5843d41d560fe5a03da209146c2746e1f6d74f5e4a375d764d902c1a0d7f9e2e5321b675006cef60828b37d53b96a3f6d0d0156666c058c2137319966e411e5a700e7e75b7df697d765c00201d2620634a95371378bdf763346dedd41784b13712afa071914c46120ce5c44639d0dd2df7b48eba97f343ae4a3420efaf5a51204fe6f5153358e2e5deb22c8d27649aeb5cffdd86dfd8e280d3c153a0da45d876aa9552f946ae7e106b3052dbfed090eeb2ef0285cc537c40df60b09ba3088d3a56b16358a46921dfa050de3d47b99219c4ad8cfb120c33235fbc38aa95122c7957e707274dd5d1c3ba5fad3a65deed790b66a8b6defa5f66c1470df6ce113a3e10882ef96f5cc158a43aeaa3eb51962600260f639897411e8086a4624bba2452a30f495ddf61a0f1b64e73f84e3ceb29ecfd35f3b8a65582809f19d3ebe6cf217bef5ef65df063f91fa9ba75743fc82afec000cabd4f03463d64bb591b295f03465f677874edece76001cb29450e5bfa0f0b8ccadaaeb8479d2c60bb97f4427df9d44afa7f6bc193c2c043701945238ed30152312f7f4f6b918ee58c2b6294e4d0ad5d162069edfc70cd69b9e8c16eb8afddb0fecda907f10b89af3819b27f0a52454741b01387abedfc06fbb604ce528559310abda22d95dfd7e03cc4fb1b7bb4ab2b0ae9e53405cfd2c92cd789f34daf388ee0d339e952ffc88ddd0697c8ff8d8e8585166de5d90ec866ea85672d7370c1ea7ff4a2cc9796ace372a89024db79de8b9fb86ba3ac4d5488c54558926c10762615f23f3c076ea8b77ae43e5670183c86dae1a29b23462643a18507718215791a7ed248b2b570989e72d546fb206dd2de57d9a2ef41e947792880620b56db96beb1b0d16439778d1bd8a9e33caf1cc5808c36c90e3bd3d5029c523aeb124e0f3bb1bbd72ed506db57b1b2389f939c5277091198fdc6c892af03b24bc5de7907c1d5d317cc22695da2803e9af981674f4e414b14bc13d7cfcfe808f6e077bee1ffdf34f3c1d1e00eebb55608251e387a6e64629f880c480c6408a05fe6787a92320ae3cb6608c72373a472af009de30132d58f5249548351a48cad96867bee901352d992aec439be6309f212a18425d31a8ee816826ce874ea2b2c3aa9e98805d99dacec8e036986ff1dd772d2ea54179d74eac302f6671ce31d58d2b761d6c0f365d541085d6a531c11b2bf45810a43728ada93a156ef5b3b89c46b6cfc477d3677ee1ac06fc78da9c5e2a4b4ae6524f3", 0x4d9, r0) keyctl$revoke(0x3, r1) 19:21:46 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:46 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, 0x0) 19:21:46 executing program 5: getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:46 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) poll(&(0x7f0000002080)=[{r0}], 0x1, 0x5c) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) connect$unix(r2, &(0x7f0000000600)=@file={0x1, './file0\x00'}, 0x6e) r3 = add_key(&(0x7f0000000040)='cifs.spnego\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="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", 0x4d9, 0xffffffffffffffff) keyctl$revoke(0x3, r3) ioctl$vim2m_VIDIOC_CREATE_BUFS(r2, 0xc100565c, &(0x7f0000000680)={0x1, 0xff, 0x2, {0x3, @raw_data="7ece8c9ce3901008577b4788ab31064ccf35c308fbcd6521d23361752e620232e6075bbfdc0e22f27c1dc67eefcdb8c3aa92895216595a6ef7248f38ae03342410d26a34058d1de5d8bff786e0f5ae3a2edab4936d238fc6382f257ae27a77f86ea08a433d9e565838c2248f357280b7d31376f78a27cdcd525b81a92de144042c8c31479e18a12445d5775f21f43ac5d94f980dea8d1d5afbc1cae4ac65b7c518f0d7fd343db7b05c75dc19848fa93db4ad16b4953e51f29cd27f22cb6affa6d04de8145ac05fc5"}, 0x80000000}) 19:21:46 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, 0x0) 19:21:46 executing program 5: getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:46 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) getpid() 19:21:46 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:46 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, 0x0) 19:21:46 executing program 4: getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:46 executing program 3: r0 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="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", 0x4d9, 0xffffffffffffffff) pkey_alloc(0x0, 0x4) setpriority(0x1, 0x0, 0x4) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4800) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000640)="26ac3c8926c6462e6202ef8a646a36710917c8a8224f8f99ae3ce5f6bb07fa14754a299745e60366c14bc5ca61e3ca0f9e527bb23019afe82b0915f8452afdd02666cc4cf5975ddb652fec7c0b8eb45169d0689ae4d9f03a2302701d2444b4b0cd91fa1a989c198ac40f1fcfb4eac2ca3f41bb9818f9c65b0433a6b9a33414a29689010beb68c962dd6bf3004442b54d38274b37a7a120e9ada927eed7aaac6fff845e5d8da8cdc2806b174e692fc15c034bb50f8af54674a9") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) poll(&(0x7f0000002080)=[{r2}], 0x1, 0x5c) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup2(r3, r2) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) ioctl$RTC_VL_READ(r4, 0x80047013, &(0x7f0000000700)) keyctl$revoke(0x3, r0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000600)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000000)={'macsec0\x00'}) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_delete(0x0) 19:21:46 executing program 5: getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:46 executing program 4: getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:46 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:46 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) getpid() 19:21:46 executing program 3: r0 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000800)="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", 0x566, 0xffffffffffffffff) accept4$x25(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x12, 0x40000) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) poll(&(0x7f0000002080)=[{r1}], 0x1, 0x5c) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup2(r2, r1) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) poll(&(0x7f0000002080)=[{}], 0x1, 0x5c) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) ioctl$sock_inet6_tcp_SIOCATMARK(r5, 0x8905, &(0x7f0000000100)) getsockopt$X25_QBITINCL(r3, 0x106, 0x1, &(0x7f0000000600), &(0x7f0000000640)=0x4) keyctl$revoke(0x3, r0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000780)={0x1f, 0x0, @none}, &(0x7f00000007c0)=0xe, 0x800) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000680)='/dev/vcsa\x00', 0x200000, 0x0) ioctl$SNDCTL_DSP_STEREO(r6, 0xc0045003, &(0x7f0000000740)) getsockname$l2tp6(r6, &(0x7f00000006c0)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000700)=0x20) 19:21:46 executing program 4: getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:46 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:46 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:46 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:46 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:46 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:46 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:46 executing program 3: r0 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="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", 0x4d9, 0xffffffffffffffff) r1 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$F2FS_IOC_RESIZE_FS(r1, 0x4008f510, &(0x7f0000000000)=0x3ff) keyctl$revoke(0x3, r0) 19:21:46 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:46 executing program 2: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) getpid() 19:21:46 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:46 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:46 executing program 3: r0 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="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", 0x4d9, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={r0, 0x0, 0xfe}, &(0x7f0000000600)=ANY=[@ANYBLOB="656e633d6f61657020686173683d7368613378342d6176783200000000000089e900"/78], 0xfffffffffffffffd, &(0x7f0000000680)=""/254) 19:21:47 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, 0x0) 19:21:47 executing program 3: r0 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="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", 0x4d9, 0xffffffffffffffff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) poll(&(0x7f0000002080)=[{r1}], 0x1, 0x5c) r2 = socket$netlink(0x10, 0x3, 0x0) dup2(r2, r1) writev(r2, &(0x7f0000000680)=[{&(0x7f0000000000)="628522135a9b09f340a4911ae958ac704e191d9ca4d0b1a80e098294aa4d47d3e7599c289d500cfe0be0962cae5eb3d0fc8aa289177ae35ab8a72ca9dafec4eda431e102cea9de7134617f6b66aff665bc1a5dc9ec489065863450426d3fc91e8a456e2dc96763f92791f36cc3c3dd2b", 0x70}, {&(0x7f0000000600)="649dadecd862f5813b1bd6f60dd6655955f75b172a2588439b359ba35034c6395282b0143ecdb70cc7370aebb1f2cf5d5d2f1c7a9221b02d4e3b7b46434d32cd6a848ecdc18a381bbbed27a449ae16013f5aa010cb11bafe5b77f3", 0x5b}], 0x2) keyctl$revoke(0x3, r0) 19:21:47 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, 0x0) 19:21:47 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:47 executing program 3: r0 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="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", 0x4d9, 0xffffffffffffffff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) poll(&(0x7f0000002080)=[{r1}], 0x1, 0x5c) r2 = socket$netlink(0x10, 0x3, 0x0) dup2(r2, r1) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r6) syz_mount_image$jffs2(&(0x7f0000000780)='jffs2\x00', &(0x7f00000007c0)='./file1\x00', 0x8, 0x6, &(0x7f0000000b40)=[{&(0x7f0000000800)="18acf4286279613a4b34e1f78103b964590d6b26f294edd65b2fc7f420bc25a4e19246496913ae620946293c03191188ad16d4822c4b8b8b330a6987583f3b514251b1e046d7254620d73930bcce5b44c4fa5634811747c740b6f55591b9e9a5869b62b3eb493275e755f2852e4a0c9006a41a349f4849d1469ee578d0ec4fc2a6c8f3a91d0de0f077cfe5d35df4afd0abeb2ee68cfbc7b316a05542d2f594709bae63e683304ce4c18724d45660ffc70b52fff1d0820d07ced6a9ebdbcba52b54975e04bb", 0xc5, 0x3f}, {&(0x7f0000000900)="5a69febb9189af1447f6df5728dbf26ee156b9c66ca8a35334827b5472ea79a1ea1e843c59fea147326715b20d24a35dbd08895067fecf5af3f919e8edf3409808d03ba3c6c86598a5cc312554df1349b12c209a5f2076bd", 0x58, 0xfffffffffffff000}, {&(0x7f0000000980)="287deea04b6b747af40a9f38f4fb7cd84efab33b9e2ff26611de311e0982b5e4362da82faf07982f1087196c29b5009307457ede3d0ae060010303b4f2681da2e4e90c4ba0e0d45da63dc631aba7e81b9539", 0x52}, {&(0x7f0000000a00)="7bc9ed76c8334103e44b721c89684e9fce04f2f626bc4571e69a80eecf529b01c003c5382c3b39f0cc39832608b9a8520f3746fcd527783c404647c92ba45d871a82059236c6207d7c5d071a33b2eef35e54eb7f13943b35bfada2fe93ede448f5b0f616b37ab1c1f4b885c4822ed7aa30f3f811664013560712519c7aebf2083d5566308dc722b1a81efc1ec46f0a1fe76087749b2db65aaabe8ee761ab4c46b5d707d7c5317edb3b7119", 0xab, 0xfb}, {&(0x7f0000000ac0)="71797493ea95de8fb7e89ce8078b384a5af16766d2becb5011bb9fd4295932f39248ce902a550aa8", 0x28, 0x8}, {&(0x7f0000000b00), 0x0, 0x6}], 0x2000059, &(0x7f0000000c00)={[{@compr_zlib='compr=zlib'}, {@compr_zlib='compr=zlib'}, {@compr_zlib='compr=zlib'}, {@compr_zlib='compr=zlib'}, {@rp_size={'rp_size', 0x3d, 0x40}}], [{@fsmagic={'fsmagic', 0x3d, 0x9}}, {@dont_hash='dont_hash'}, {@subj_user={'subj_user', 0x3d, '$:'}}, {@uid_lt={'uid<', r3}}, {@fowner_gt={'fowner>', r6}}, {@hash='hash'}, {@obj_type={'obj_type', 0x3d, '[+'}}]}) getgroups(0x2, &(0x7f0000000680)=[0x0, 0xffffffffffffffff]) fsetxattr$system_posix_acl(r2, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f00000006c0)={{}, {}, [{0x2, 0x7}, {0x2, 0x4, 0xffffffffffffffff}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x0, 0xee00}], {0x4, 0x3}, [{0x8, 0x6, r4}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x4, r7}, {0x8, 0x3, 0xee01}], {0x10, 0x3}, {0x20, 0x4}}, 0x64, 0x2) keyctl$revoke(0x3, r0) r8 = dup3(r2, r1, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r8, 0xc01c64ae, &(0x7f0000000740)={0x2, 0x9, 0x3ff, 0x54c7, 0x1000, 0x6}) 19:21:47 executing program 2: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) getpid() 19:21:47 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, 0x0) 19:21:47 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:21:47 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, 0x0) [ 175.895945] MTD: Attempt to mount non-MTD device "/dev/loop3" 19:21:47 executing program 3: r0 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="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", 0x4d9, 0xffffffffffffffff) keyctl$revoke(0x3, r0) set_robust_list(&(0x7f0000000600)={0x0, 0x8, &(0x7f0000000040)={&(0x7f0000000000)}}, 0x18) 19:21:47 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, 0x0) 19:21:47 executing program 2: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) getpid() 19:21:47 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, 0x0) 19:21:47 executing program 3: r0 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="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", 0x4d9, 0xffffffffffffffff) keyctl$revoke(0x3, r0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000600)="54a3ff2641b34553f2e1a128c261a4f3bb3fd77bf40f573957e4e4d96de8c5f8c47f8a838841929b57f71406530fd9119731f60970a5c748bce8c7383a2ad51bb13a13d3ba9b8afc2a2fed778a85d39bf7085320c70e329ff74007e2c15441d368f3355884793e6baf780172099417c6f5d8b0e2123485f7a3f857cfecb1c79cb61d79df201fe1b6d5010da5d893849970fc476b8c4078b7e4129bdad3c2722fd57a21029951525bb3cdb4d93d267d1ecd9cad", 0xb3, 0xfff, &(0x7f0000000000)={0x0, 0x989680}) 19:21:47 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) poll(&(0x7f0000002080)=[{r0}], 0x1, 0x5c) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) poll(&(0x7f0000002080)=[{r3}], 0x1, 0x5c) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$UFFDIO_ZEROPAGE(r2, 0xc020aa04, &(0x7f0000000e80)={{&(0x7f0000ffb000/0x4000)=nil, 0x4000}}) r5 = dup2(r4, r3) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) r6 = syz_open_dev$radio(&(0x7f0000000e40)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_G_ENC_INDEX(r6, 0x8818564c, &(0x7f0000000600)) r7 = add_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000100)="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", 0x4d9, 0xffffffffffffffff) keyctl$revoke(0x3, r7) 19:21:47 executing program 3: keyctl$revoke(0x3, 0x0) 19:21:47 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:47 executing program 3: r0 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="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", 0x4d9, 0xffffffffffffffff) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x1}) keyctl$revoke(0x3, r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) openat$ion(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ion\x00', 0x4, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) poll(&(0x7f0000002080)=[{r2}], 0x1, 0x5c) r3 = socket$netlink(0x10, 0x3, 0x0) dup2(r3, r2) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f00000006c0)={'syzkaller0\x00', {0x2, 0x0, @initdev}}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740)='/dev/loop-control\x00', 0x131001, 0x0) poll(&(0x7f0000000640)=[{r2, 0x825a}], 0x1, 0x5d) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = dup2(r4, r1) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, &(0x7f0000000700)={0x4, 0x0, @value=0xd2}) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x2, 0x6, 0x237a90090}) 19:21:47 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:48 executing program 3: r0 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="e9732af69a355544cecb8f7a403138df480158364dfc0bc118710d801669943f01e3cb332f6b8bbeaa133d43a6e992201c8d9b16aa387e841f8de0f68aa3a15d95475cded0860ba450f24b479824ddc0ee5e59fa0b38e3e215d14161752ff0fdcc5d3c70f7d749d7f8dd2a691d6b008b207af750bb72a0cbdd966bc5d4ce4f13760e502996c83cb2b26c3c1a4cf788acb0335f9d3a2f49e5505d389a89141aeff9a76648e728e038331aacd4625972fa1e7ee53db4af796392583e2b46332ead1ca64b1a61c6c54a037fa664fec474ff368f5e86b362e89be77e7eedd328d2ac730df42cf3e12035e1a6d9aceb14813b0d2d2fcc31ea1114831fdd5f8eea79a8061edd8e981c3931b16251fb3270d63d08a98704a4d34553dd649055d20c6b2fd40221e30cd848bed217cb955fdb677cf26906ecf01985ef5088a5eee9f4cdc4a5a487b11b8ab2f3fe2a20dbebc2517778f4b760d1bc5843d41d560fe5a03da209146c2746e1f6d74f5e4a375d764d902c1a0d7f9e2e5321b675006cef60828b37d53b96a3f6d0d0156666c058c2137319966e411e5a700e7e75b7df697d765c00201d2620634a95371378bdf763346dedd41784b13712afa071914c46120ce5c44639d0dd2df7b48eba97f343ae4a3420efaf5a51204fe6f5153358e2e5deb22c8d27649aeb5cffdd86dfd8e280d3c153a0da45d876aa9552f946ae7e106b3052dbfed090eeb2ef0285cc537c40df60b09ba3088d3a56b16358a46921dfa050de3d47b99219c4ad8cfb120c33235fbc38aa95122c7957e707274dd5d1c3ba5fad3a65deed790b66a8b6defa5f66c1470df6ce113a3e10882ef96f5cc158a43aeaa3eb51962600260f639897411e8086a4624bba2452a30f495ddf61a0f1b64e73f84e3ceb29ecfd35f3b8a65582809f19d3ebe6cf217bef5ef65df063f91fa9ba75743fc82afec000cabd4f03463d64bb591b295f03465f677874edece76001cb29450e5bfa0f0b8ccadaaeb8479d2c60bb97f4427df9d44afa7f6bc193c2c043701945238ed30152312f7f4f6b918ee58c2b6294e4d0ad5d162069edfc70cd69b9e8c16eb8afddb0fecda907f10b89af3819b27f0a52454741b01387abedfc06fbb604ce528559310abda22d95dfd7e03cc4fb1b7bb4ab2b0ae9e53405cfd2c92cd789f34daf388ee0d339e952ffc88ddd0697c8ff8d8e8585166de5d90ec866ea85672d7370c1ea7ff4a2cc9796ace372a89024db79de8b9fb86ba3ac4d5488c54558926c10762615f23f3c076ea8b77ae43e5670183c86dae1a29b23462643a18507718215791a7ed248b2b570989e72d546fb206dd2de57d9a2ef41e947792880620b56db96beb1b0d16439778d1bd8a9e33caf1cc5808c36c90e3bd3d5029c523aeb124e0f3bb1bbd72ed506db57b1b2389f939c5277091198fdc6c892af03b24bc5de7907c1d5d317cc22695da2803e9af981674f4e414b14bc13d7cfcfe808f6e077bee1ffdf34f3c1d1e00eebb55608251e387a6e64629f880c480c6408a05fe6787a92320ae3cb6608c72373a472af009de30132d58f5249548351a48cad96867bee901352d992aec439be6309f212a18425d31a8ee816826ce874ea2b2c3aa9e98805d99dacec8e036986ff1dd772d2ea54179d74eac302f6671ce31d58d2b761d6c0f365d541085d6a531c11b2bf45810a43728ada93a156ef5b3b89c46b6cfc477d3677ee1ac06fc78da9c5e2a4b4ae6524f3", 0x4d9, 0xffffffffffffffff) keyctl$revoke(0x3, r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) poll(&(0x7f0000002080)=[{r1}], 0x1, 0x5c) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000600)={0x81, 0x0, [0x100000001, 0x80000000, 0x4, 0x8]}) r3 = dup2(r2, r1) ioctl$SIOCPNENABLEPIPE(r3, 0x89ed, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) ioctl$TIOCCBRK(r3, 0x5428) 19:21:48 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:48 executing program 3: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xb20b, 0x28400) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) open$dir(&(0x7f00000006c0)='./file0\x00', 0x100, 0x8) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) poll(&(0x7f0000002080)=[{r1}], 0x1, 0x5c) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) poll(&(0x7f0000002080)=[{r3}], 0x1, 0x5c) r4 = socket$netlink(0x10, 0x3, 0x0) dup2(r4, r3) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) poll(&(0x7f0000002080)=[{r5}], 0x1, 0x5c) r6 = dup2(r2, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) setsockopt$CAIFSO_REQ_PARAM(r6, 0x116, 0x80, &(0x7f0000000600)="ee16c48c97cad33993f0021e72e85cc4209f0dd6467f883d3075f0a9965fae20df4d2b3602c176ce1debd02452a6bda5112b3c6c13ef1f7e60bb865bb81e3441ba00494accf9c1914647cd3a28f419ecafe2429f9699000441ecf55ac199a37c460fd6ee9b6099109d6529289b7149bcc6fbbec3f2bdb16c2ea0ee50c619e77880e151a662b32b3d579ffb57f6272abd426d499ebea5d3fb5b7c889dd60b061c5b0a449c805dc379b1d34b1a254b077559ca95e36d775c85ba5e0d45101475bd", 0xc0) r7 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="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", 0x4d9, 0xffffffffffffffff) keyctl$revoke(0x3, r7) 19:21:48 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:48 executing program 3: r0 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="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", 0x4d4, 0xffffffffffffffff) keyctl$revoke(0x3, r0) 19:21:48 executing program 3: r0 = add_key(&(0x7f0000000000)='ceph\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000600)="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", 0x4dd, 0xffffffffffffffff) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0xdea) keyctl$revoke(0x3, r0) 19:21:48 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:48 executing program 3: add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="e9732af69a355544cecb8f7a403138df480158364dfc0bc118710d801669943f01e3cb332f6b8bbeaa133d43a6e992201c8d9b16aa387e841f8de0f68aa3a15d95475cded0860ba450f24b479824ddc0ee5e59fa0b38e3e215d14161752ff0fdcc5d3c70f7d749d7f8dd2a691d6b008b207af750bb72a0cbdd966bc5d4ce4f13760e502996c83cb2b26c3c1a4cf788acb0335f9d3a2f49e5505d389a89141aeff9a76648e728e038331aacd4625972fa1e7ee53db4af796392583e2b46332ead1ca64b1a61c6c54a037fa664fec474ff368f5e86b362e89be77e7eedd328d2ac730df42cf3e12035e1a6d9aceb14813b0d2d2fcc31ea1114831fdd5f8eea79a8061edd8e981c3931b16251fb3270d63d08a98704a4d34553dd649055d20c6b2fd40221e30cd848bed217cb955fdb677cf26906ecf01985ef5088a5eee9f4cdc4a5a487b11b8ab2f3fe2a20dbebc2517778f4b760d1bc5843d41d560fe5a03da209146c2746e1f6d74f5e4a375d764d902c1a0d7f9e2e5321b675006cef60828b37d53b96a3f6d0d0156666c058c2137319966e411e5a700e7e75b7df697d765c00201d2620634a95371378bdf763346dedd41784b13712afa071914c46120ce5c44639d0dd2df7b48eba97f343ae4a3420efaf5a51204fe6f5153358e2e5deb22c8d27649aeb5cffdd86dfd8e280d3c153a0da45d876aa9552f946ae7e106b3052dbfed090eeb2ef0285cc537c40df60b09ba3088d3a56b16358a46921dfa050de3d47b99219c4ad8cfb120c33235fbc38aa95122c7957e707274dd5d1c3ba5fad3a65deed790b66a8b6defa5f66c1470df6ce113a3e10882ef96f5cc158a43aeaa3eb51962600260f639897411e8086a4624bba2452a30f495ddf61a0f1b64e73f84e3ceb29ecfd35f3b8a65582809f19d3ebe6cf217bef5ef65df063f91fa9ba75743fc82afec000cabd4f03463d64bb591b295f03465f677874edece76001cb29450e5bfa0f0b8ccadaaeb8479d2c60bb97f4427df9d44afa7f6bc193c2c043701945238ed30152312f7f4f6b918ee58c2b6294e4d0ad5d162069edfc70cd69b9e8c16eb8afddb0fecda907f10b89af3819b27f0a52454741b01387abedfc06fbb604ce528559310abda22d95dfd7e03cc4fb1b7bb4ab2b0ae9e53405cfd2c92cd789f34daf388ee0d339e952ffc88ddd0697c8ff8d8e8585166de5d90ec866ea85672d7370c1ea7ff4a2cc9796ace372a89024db79de8b9fb86ba3ac4d5488c54558926c10762615f23f3c076ea8b77ae43e5670183c86dae1a29b23462643a18507718215791a7ed248b2b570989e72d546fb206dd2de57d9a2ef41e947792880620b56db96beb1b0d16439778d1bd8a9e33caf1cc5808c36c90e3bd3d5029c523aeb124e0f3bb1bbd72ed506db57b1b2389f939c5277091198fdc6c892af03b24bc5de7907c1d5d317cc22695da2803e9af981674f4e414b14bc13d7cfcfe808f6e077bee1ffdf34f3c1d1e00eebb55608251e387a6e64629f880c480c6408a05fe6787a92320ae3cb6608c72373a472af009de30132d58f5249548351a48cad96867bee901352d992aec439be6309f212a18425d31a8ee816826ce874ea2b2c3aa9e98805d99dacec8e036986ff1dd772d2ea54179d74eac302f6671ce31d58d2b761d6c0f365d541085d6a531c11b2bf45810a43728ada93a156ef5b3b89c46b6cfc477d3677ee1ac06fc78da9c5e2a4b4ae6524f3", 0x4d9, 0xffffffffffffffff) 19:21:49 executing program 3: r0 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="e9732af69a355544cecb8f7a403138df480158364dfc0bc118710d801669943f01e3cb332f6b8bbeaa133d43a6e992201c8d9b16aa387e841f8de0f68aa3a15d95475cded0860ba450f24b479824ddc0ee5e59fa0b38e3e215d14161752ff0fdcc5d3c70f7d749d7f8dd2a691d6b008b207af750bb72a0cbdd966bc5d4ce4f13760e502996c83cb2b26c3c1a4cf788acb0335f9d3a2f49e5505d389a89141aeff9a76648e728e038331aacd4625972fa1e7ee53db4af796392583e2b46332ead1ca64b1a61c6c54a037fa664fec474ff368f5e86b362e89be77e7eedd328d2ac730df42cf3e12035e1a6d9aceb14813b0d2d2fcc31ea1114831fdd5f8eea79a8061edd8e981c3931b16251fb3270d63d08a98704a4d34553dd649055d20c6b2fd40221e30cd848bed217cb955fdb677cf26906ecf01985ef5088a5eee9f4cdc4a5a487b11b8ab2f3fe2a20dbebc2517778f4b760d1bc5843d41d560fe5a03da209146c2746e1f6d74f5e4a375d764d902c1a0d7f9e2e5321b675006cef60828b37d53b96a3f6d0d0156666c058c2137319966e411e5a700e7e75b7df697d765c00201d2620634a95371378bdf763346dedd41784b13712afa071914c46120ce5c44639d0dd2df7b48eba97f343ae4a3420efaf5a51204fe6f5153358e2e5deb22c8d27649aeb5cffdd86dfd8e280d3c153a0da45d876aa9552f946ae7e106b3052dbfed090eeb2ef0285cc537c40df60b09ba3088d3a56b16358a46921dfa050de3d47b99219c4ad8cfb120c33235fbc38aa95122c7957e707274dd5d1c3ba5fad3a65deed790b66a8b6defa5f66c1470df6ce113a3e10882ef96f5cc158a43aeaa3eb51962600260f639897411e8086a4624bba2452a30f495ddf61a0f1b64e73f84e3ceb29ecfd35f3b8a65582809f19d3ebe6cf217bef5ef65df063f91fa9ba75743fc82afec000cabd4f03463d64bb591b295f03465f677874edece76001cb29450e5bfa0f0b8ccadaaeb8479d2c60bb97f4427df9d44afa7f6bc193c2c043701945238ed30152312f7f4f6b918ee58c2b6294e4d0ad5d162069edfc70cd69b9e8c16eb8afddb0fecda907f10b89af3819b27f0a52454741b01387abedfc06fbb604ce528559310abda22d95dfd7e03cc4fb1b7bb4ab2b0ae9e53405cfd2c92cd789f34daf388ee0d339e952ffc88ddd0697c8ff8d8e8585166de5d90ec866ea85672d7370c1ea7ff4a2cc9796ace372a89024db79de8b9fb86ba3ac4d5488c54558926c10762615f23f3c076ea8b77ae43e5670183c86dae1a29b23462643a18507718215791a7ed248b2b570989e72d546fb206dd2de57d9a2ef41e947792880620b56db96beb1b0d16439778d1bd8a9e33caf1cc5808c36c90e3bd3d5029c523aeb124e0f3bb1bbd72ed506db57b1b2389f939c5277091198fdc6c892af03b24bc5de7907c1d5d317cc22695da2803e9af981674f4e414b14bc13d7cfcfe808f6e077bee1ffdf34f3c1d1e00eebb55608251e387a6e64629f880c480c6408a05fe6787a92320ae3cb6608c72373a472af009de30132d58f5249548351a48cad96867bee901352d992aec439be6309f212a18425d31a8ee816826ce874ea2b2c3aa9e98805d99dacec8e036986ff1dd772d2ea54179d74eac302f6671ce31d58d2b761d6c0f365d541085d6a531c11b2bf45810a43728ada93a156ef5b3b89c46b6cfc477d3677ee1ac06fc78da9c5e2a4b4ae6524f3", 0x4d9, 0xffffffffffffffff) keyctl$revoke(0x3, r0) r1 = add_key$fscrypt_provisioning(&(0x7f0000000000)='fscrypt-provisioning\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f00000006c0)=ANY=[@ANYBLOB="42000000000000006162636465666768696a6b6c6d6e6f70a487817190e40ef6b7d22fb9910d4bfdbbbacb386af90f07f250865bc0eea3133ef57d13c9671a8ab079a2285cfa0fc630af8305394898d3bd9319bedb0808296f040f8077c30f418638558af73f8a3d4dc6eb0e68e50d99f8102fd38a9c6022add5ee81992991574518c56d6a1c0000"], 0x18, r0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r2, 0x4018f50b, &(0x7f0000000640)={0x0, 0x40, 0x7}) setuid(r3) r4 = getegid() setgid(r4) keyctl$chown(0x4, r1, r3, r4) 19:21:49 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:49 executing program 3: r0 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="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", 0x4d9, 0xffffffffffffffff) keyctl$revoke(0x3, r0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x68002, 0x0) ioctl$SNDCTL_TMR_TEMPO(r1, 0xc0045405, &(0x7f0000000740)=0xd5) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) poll(&(0x7f0000002080)=[{r2, 0x31c0}], 0x1, 0x5c) r3 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000007c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = dup2(r4, r2) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) r6 = fcntl$getown(r4, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r5, 0xc1105518, &(0x7f0000000880)={{0x5, 0x2, 0x0, 0xffff, 'syz1\x00', 0x4}, 0x3, 0x400, 0x819, r6, 0xa, 0x0, 'syz0\x00', &(0x7f00000006c0)=['\x00\x00', '/dev/net/tun\x00', '/dev/net/tun\x00', 'syz', 'syzkaller1\x00', '[]\x18]]\x00', ',[\x00', 'syzkaller1\x00', '/dev/net/tun\x00', 'syzkaller1\x00'], 0x56, [], [0x5, 0x800, 0x1000, 0x8]}) r7 = getegid() setgid(r7) write$P9_RGETATTR(r5, &(0x7f0000000600)={0xa0, 0x19, 0x2, {0x20, {0x2, 0x0, 0x7}, 0x40, 0xee01, r7, 0xc78, 0x8001, 0xe, 0x1, 0xd, 0x8, 0xe81, 0x6b, 0x7ff, 0xdde, 0x9, 0x3f, 0x5, 0x200, 0x9}}, 0xa0) r8 = request_key(&(0x7f0000000800)='rxrpc\x00', &(0x7f0000000840)={'syz', 0x0}, &(0x7f00000009c0)='!\x00', r3) keyctl$read(0xb, r8, &(0x7f0000000a00)=""/44, 0x2c) 19:21:49 executing program 3: prctl$PR_GET_FP_MODE(0x2e) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) poll(&(0x7f0000002080)=[{r0}], 0x1, 0x5c) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000000000)={0x1cbd, 0x5c, 0x43, 0xffffffc1, 0x100, 0x4}) r3 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="e9732af69a355544cecb8f7a403138df480158364dfc0bc118710d801669943f01e3cb332f6b8bbeaa133d43a6e992201c8d9b16aa387e841f8de0f68aa3a15d95475cded0860ba450f24b479824ddc0ee5e59fa0b38e3e215d14161752ff0fdcc5d3c70f7d749d7f8dd2a691d6b008b207af750bb72a0cbdd966bc5d4ce4f13760e502996c83cb2b26c3c1a4cf788acb0335f9d3a2f49e5505d389a89141aeff9a76648e728e038331aacd4625972fa1e7ee53db4af796392583e2b46332ead1ca64b1a61c6c54a037fa664fec474ff368f5e86b362e89be77e7eedd328d2ac730df42cf3e12035e1a6d9aceb14813b0d2d2fcc31ea1114831fdd5f8eea79a8061edd8e981c3931b16251fb3270d63d08a98704a4d34553dd649055d20c6b2fd40221e30cd848bed217cb955fdb677cf26906ecf01985ef5088a5eee9f4cdc4a5a487b11b8ab2f3fe2a20dbebc2517778f4b760d1bc5843d41d560fe5a03da209146c2746e1f6d74f5e4a375d764d902c1a0d7f9e2e5321b675006cef60828b37d53b96a3f6d0d0156666c058c2137319966e411e5a700e7e75b7df697d765c00201d2620634a95371378bdf763346dedd41784b13712afa071914c46120ce5c44639d0dd2df7b48eba97f343ae4a3420efaf5a51204fe6f5153358e2e5deb22c8d27649aeb5cffdd86dfd8e280d3c153a0da45d876aa9552f946ae7e106b3052dbfed090eeb2ef0285cc537c40df60b09ba3088d3a56b16358a46921dfa050de3d47b99219c4ad8cfb120c33235fbc38aa95122c7957e707274dd5d1c3ba5fad3a65deed790b66a8b6defa5f66c1470df6ce113a3e10882ef96f5cc158a43aeaa3eb51962600260f639897411e8086a4624bba2452a30f495ddf61a0f1b64e73f84e3ceb29ecfd35f3b8a65582809f19d3ebe6cf217bef5ef65df063f91fa9ba75743fc82afec000cabd4f03463d64bb591b295f03465f677874edece76001cb29450e5bfa0f0b8ccadaaeb8479d2c60bb97f4427df9d44afa7f6bc193c2c043701945238ed30152312f7f4f6b918ee58c2b6294e4d0ad5d162069edfc70cd69b9e8c16eb8afddb0fecda907f10b89af3819b27f0a52454741b01387abedfc06fbb604ce528559310abda22d95dfd7e03cc4fb1b7bb4ab2b0ae9e53405cfd2c92cd789f34daf388ee0d339e952ffc88ddd0697c8ff8d8e8585166de5d90ec866ea85672d7370c1ea7ff4a2cc9796ace372a89024db79de8b9fb86ba3ac4d5488c54558926c10762615f23f3c076ea8b77ae43e5670183c86dae1a29b23462643a18507718215791a7ed248b2b570989e72d546fb206dd2de57d9a2ef41e947792880620b56db96beb1b0d16439778d1bd8a9e33caf1cc5808c36c90e3bd3d5029c523aeb124e0f3bb1bbd72ed506db57b1b2389f939c5277091198fdc6c892af03b24bc5de7907c1d5d317cc22695da2803e9af981674f4e414b14bc13d7cfcfe808f6e077bee1ffdf34f3c1d1e00eebb55608251e387a6e64629f880c480c6408a05fe6787a92320ae3cb6608c72373a472af009de30132d58f5249548351a48cad96867bee901352d992aec439be6309f212a18425d31a8ee816826ce874ea2b2c3aa9e98805d99dacec8e036986ff1dd772d2ea54179d74eac302f6671ce31d58d2b761d6c0f365d541085d6a531c11b2bf45810a43728ada93a156ef5b3b89c46b6cfc477d3677ee1ac06fc78da9c5e2a4b4ae6524f3", 0x4d9, 0xffffffffffffffff) keyctl$revoke(0x3, r3) 19:21:49 executing program 3: r0 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="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", 0x4d9, 0xffffffffffffffff) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x84000) write$uinput_user_dev(r1, &(0x7f0000000600)={'syz0\x00', {0xb2, 0x8, 0x200, 0x9}, 0x25, [0x6f3, 0xb4, 0x10001, 0x1f, 0x6, 0xfffffffc, 0x80000000, 0x0, 0x6, 0x6, 0x3f, 0x8, 0xff, 0xb6, 0xf8cd, 0x0, 0xffff, 0x6, 0x100, 0x6, 0x7, 0x1000, 0x8001, 0x101, 0x83bb, 0xaf, 0x1, 0x1000, 0xe4e, 0x6, 0x65, 0x0, 0x0, 0x7fff, 0x4, 0x10000000, 0x0, 0x8, 0x5, 0xe9ac, 0xde11, 0x6, 0x0, 0x1312, 0x0, 0x73aca93e, 0x80000000, 0x6, 0x501f3c59, 0x200000, 0xcac, 0x3, 0x1f, 0x5, 0x9, 0xffff, 0xd92, 0x3, 0xe, 0x84, 0x7, 0x4, 0xb0, 0x3], [0x3, 0x400, 0x81, 0xfff, 0x5, 0x1, 0x80000000, 0x2, 0x7ff, 0x6, 0x5, 0x9, 0x0, 0x9, 0x3, 0x57a4, 0x5, 0xc792, 0x1000, 0x80, 0x0, 0x5, 0x9, 0x7, 0xffffffff, 0xc0c, 0x5, 0xffff28dd, 0x40, 0x3ff, 0x8, 0x2, 0x20, 0x101, 0x5, 0xd660, 0xd5fd, 0x7, 0x80000001, 0x698, 0x1000, 0x2, 0x9, 0x2, 0xf5bd, 0x3f, 0x4, 0x1000, 0x9, 0x5, 0x7fff, 0x1, 0x0, 0x6, 0xff, 0x7fffffff, 0x80000000, 0x2, 0x3, 0x1, 0x5, 0x6, 0x89d, 0x401], [0x8, 0x6, 0x3, 0x2, 0xfffffffd, 0xffffffff, 0x8, 0x0, 0x5, 0x8000, 0x6, 0x5, 0x7f, 0x7, 0x4, 0x1, 0x3, 0x40, 0x40, 0x1, 0x3, 0x10000, 0x4, 0x8, 0x7, 0x1b8cc00, 0x10000, 0x20, 0x4, 0x1f, 0x8, 0x80, 0x6, 0x7, 0x6, 0x735d, 0x1, 0x5, 0x0, 0xffff, 0x6, 0x32, 0x742, 0x3, 0x7ff, 0x400, 0x76af, 0x16, 0x5ca, 0x7, 0x7, 0x5, 0x0, 0x6e, 0x80000000, 0xc777, 0x2, 0x8, 0x7, 0x7fffffff, 0x200, 0x6, 0x22, 0x2], [0x0, 0x5, 0x4, 0x9, 0x2, 0x0, 0x0, 0xfffff613, 0xc7, 0x6, 0x21, 0x9, 0x4, 0x2, 0x5, 0x0, 0x0, 0x101, 0x2, 0x3f, 0x40, 0x2c, 0x8000, 0x0, 0x8, 0x400, 0x9, 0xd1, 0x9, 0xf9f9, 0x20000000, 0x9, 0x1, 0x8, 0x81, 0x100, 0xff, 0x1ff, 0x1712, 0x0, 0xffff7fff, 0x5, 0x0, 0x8, 0x4af, 0x401, 0x41, 0xe2f, 0x43c, 0x9, 0x7fff, 0x0, 0x9, 0x77, 0x4, 0x3b, 0x80000000, 0x2, 0x6, 0x5, 0x937, 0x169, 0xe188, 0x4]}, 0x45c) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000000)={0x1, 0x9, 0xff, 0x1}) sendmsg$AUDIT_SET_FEATURE(r1, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x45f6c467860f7dce}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x20, 0x3fa, 0x800, 0x70bd25, 0x25dfdbfb, {0x1, 0x1, 0x1}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x54}, 0x8000) keyctl$revoke(0x3, r0) r2 = openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/asound/card1/oss_mixer\x00', 0x2002, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000bc0)={0xffffffffffffffff, 0x7, 0x18}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c40)={r4, 0x28, &(0x7f0000000c00)}, 0x10) prctl$PR_GET_TIMERSLACK(0x1e) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r5) r6 = getgid() fchown(r2, r5, r6) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) poll(&(0x7f0000002080)=[{}], 0x1, 0x5c) r7 = socket$netlink(0x10, 0x3, 0x0) dup2(r7, 0xffffffffffffffff) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r7, 0x8040942d, &(0x7f0000000c80)) 19:21:49 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:49 executing program 3: add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="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", 0x4d9, 0xffffffffffffffff) 19:21:49 executing program 3: r0 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="e9732af69a355544cecb8f7a403138df480158364dfc0bc118710d801669943f01e3cb332f6b8bbeaa133d43a6e992201c8d9b16aa387e841f8de0f68aa3a15d95475cded0860ba450f24b479824ddc0ee5e59fa0b38e3e215d14161752ff0fdcc5d3c70f7d749d7f8dd2a691d6b008b207af750bb72a0cbdd966bc5d4ce4f13760e502996c83cb2b26c3c1a4cf788acb0335f9d3a2f49e5505d389a89141aeff9a76648e728e038331aacd4625972fa1e7ee53db4af796392583e2b46332ead1ca64b1a61c6c54a037fa664fec474ff368f5e86b362e89be77e7eedd328d2ac730df42cf3e12035e1a6d9aceb14813b0d2d2fcc31ea1114831fdd5f8eea79a8061edd8e981c3931b16251fb3270d63d08a98704a4d34553dd649055d20c6b2fd40221e30cd848bed217cb955fdb677cf26906ecf01985ef5088a5eee9f4cdc4a5a487b11b8ab2f3fe2a20dbebc2517778f4b760d1bc5843d41d560fe5a03da209146c2746e1f6d74f5e4a375d764d902c1a0d7f9e2e5321b675006cef60828b37d53b96a3f6d0d0156666c058c2137319966e411e5a700e7e75b7df697d765c00201d2620634a95371378bdf763346dedd41784b13712afa071914c46120ce5c44639d0dd2df7b48eba97f343ae4a3420efaf5a51204fe6f5153358e2e5deb22c8d27649aeb5cffdd86dfd8e280d3c153a0da45d876aa9552f946ae7e106b3052dbfed090eeb2ef0285cc537c40df60b09ba3088d3a56b16358a46921dfa050de3d47b99219c4ad8cfb120c33235fbc38aa95122c7957e707274dd5d1c3ba5fad3a65deed790b66a8b6defa5f66c1470df6ce113a3e10882ef96f5cc158a43aeaa3eb51962600260f639897411e8086a4624bba2452a30f495ddf61a0f1b64e73f84e3ceb29ecfd35f3b8a65582809f19d3ebe6cf217bef5ef65df063f91fa9ba75743fc82afec000cabd4f03463d64bb591b295f03465f677874edece76001cb29450e5bfa0f0b8ccadaaeb8479d2c60bb97f4427df9d44afa7f6bc193c2c043701945238ed30152312f7f4f6b918ee58c2b6294e4d0ad5d162069edfc70cd69b9e8c16eb8afddb0fecda907f10b89af3819b27f0a52454741b01387abedfc06fbb604ce528559310abda22d95dfd7e03cc4fb1b7bb4ab2b0ae9e53405cfd2c92cd789f34daf388ee0d339e952ffc88ddd0697c8ff8d8e8585166de5d90ec866ea85672d7370c1ea7ff4a2cc9796ace372a89024db79de8b9fb86ba3ac4d5488c54558926c10762615f23f3c076ea8b77ae43e5670183c86dae1a29b23462643a18507718215791a7ed248b2b570989e72d546fb206dd2de57d9a2ef41e947792880620b56db96beb1b0d16439778d1bd8a9e33caf1cc5808c36c90e3bd3d5029c523aeb124e0f3bb1bbd72ed506db57b1b2389f939c5277091198fdc6c892af03b24bc5de7907c1d5d317cc22695da2803e9af981674f4e414b14bc13d7cfcfe808f6e077bee1ffdf34f3c1d1e00eebb55608251e387a6e64629f880c480c6408a05fe6787a92320ae3cb6608c72373a472af009de30132d58f5249548351a48cad96867bee901352d992aec439be6309f212a18425d31a8ee816826ce874ea2b2c3aa9e98805d99dacec8e036986ff1dd772d2ea54179d74eac302f6671ce31d58d2b761d6c0f365d541085d6a531c11b2bf45810a43728ada93a156ef5b3b89c46b6cfc477d3677ee1ac06fc78da9c5e2a4b4ae6524f3", 0x4d9, 0xffffffffffffffff) keyctl$revoke(0x3, r0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000000)={'nat\x00', 0x2, [{}, {}]}, 0x48) 19:21:49 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:49 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x104000, 0x0) write$P9_RWALK(r0, &(0x7f0000000040)={0x23, 0x6f, 0x1, {0x2, [{0x20, 0x4, 0x2}, {0x2, 0x2}]}}, 0x23) r1 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000680)="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", 0x4d9, 0xfffffffffffffffd) r2 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f0000000bc0)=@add_del={0x2, &(0x7f0000000b80)='ip6tnl0\x00'}) keyctl$revoke(0x3, r1) r3 = add_key(&(0x7f0000000640)='big_key\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000100)="e9732af69a355544cecb8f7a403138df480158364dfc0bc118710d801669943f01e3cb332f6b8bbeaa133d43a6e992201c8d9b16aa387e841f8de0f68aa3a15d95475cded0860ba450f24b479824ddc0ee5e59fa0b38e3e215d14161752ff0fdcc5d3c70f7d749d7f8dd2a691d6b008b207af750bb72a0cbdd966bc5d4ce4f13760e502996c83cb2b26c3c1a4cf788acb0335f9d3a2f49e5505d389a89141aeff9a76648e728e038331aacd4625972fa1e7ee53db4af796392583e2b46332ead1ca64b1a61c6c54a037fa664fec474ff368f5e86b362e89be77e7eedd328d2ac730df42cf3e12035e1a6d9aceb14813b0d2d2fcc31ea1114831fdd5f8eea79a8061edd8e981c3931b16251fb3270d63d08a98704a4d34553dd649055d20c6b2fd40221e30cd848bed217cb955fdb677cf26906ecf01985ef5088a5eee9f4cdc4a5a487b11b8ab2f3fe2a20dbebc2517778f4b760d1bc5843d41d560fe5a03da209146c2746e1f6d74f5e4a375d764d902c1a0d7f9e2e5321b675006cef60828b37d53b96a3f6d0d0156666c058c2137319966e411e5a700e7e75b7df697d765c00201d2620634a95371378bdf763346dedd41784b13712afa071914c46120ce5c44639d0dd2df7b48eba97f343ae4a3420efaf5a51204fe6f5153358e2e5deb22c8d27649aeb5cffdd86dfd8e280d3c153a0da45d876aa9552f946ae7e106b3052dbfed090eeb2ef0285cc537c40df60b09ba3088d3a56b16358a46921dfa050de3d47b99219c4ad8cfb120c33235fbc38aa95122c7957e707274dd5d1c3ba5fad3a65deed790b66a8b6defa5f66c1470df6ce113a3e10882ef96f5cc158a43aeaa3eb51962600260f639897411e8086a4624bba2452a30f495ddf61a0f1b64e73f84e3ceb29ecfd35f3b8a65582809f19d3ebe6cf217bef5ef65df063f91fa9ba75743fc82afec000cabd4f03463d64bb591b295f03465f677874edece76001cb29450e5bfa0f0b8ccadaaeb8479d2c60bb97f4427df9d44afa7f6bc193c2c043701945238ed30152312f7f4f6b918ee58c2b6294e4d0ad5d162069edfc70cd69b9e8c16eb8afddb0fecda907f10b89af3819b27f0a52454741b01387abedfc06fbb604ce528559310abda22d95dfd7e03cc4fb1b7bb4ab2b0ae9e53405cfd2c92cd789f34daf388ee0d339e952ffc88ddd0697c8ff8d8e8585166de5d90ec866ea85672d7370c1ea7ff4a2cc9796ace372a89024db79de8b9fb86ba3ac4d5488c54558926c10762615f23f3c076ea8b77ae43e5670183c86dae1a29b23462643a18507718215791a7ed248b2b570989e72d546fb206dd2de57d9a2ef41e947792880620b56db96beb1b0d16439778d1bd8a9e33caf1cc5808c36c90e3bd3d5029c523aeb124e0f3bb1bbd72ed506db57b1b2389f939c5277091198fdfc16686d696074b2c6c892af03b24bc5de7907c1d5d317cc22695da2803e9af981674f4e414b14bc13d7cfcfe808f6e077bee1ffdf34f3c1d1e00eebb55608251e387a6e64629f880c480c6408a05fe6787a92320ae3cb6608c72373a472af009de30132d58f5249548351a48cad96867bee901352d992aec439be6309f212a18425d31a8ee816826ce874ea2b2c3aa9e98805d99dacec8e036986ff1dd772d2ea54179d74eac302f6671ce31d58d2b761d6c0f365d541085d6a531c11b2bf45810a43728ada93a156ef5b3b89c46b6cfc477d3677ee1ac06fc78da9", 0x4d9, r1) keyctl$revoke(0x3, r3) write$char_usb(r0, &(0x7f0000000c80)="2b33939d81f76cdf82c96d32f78e9eb7eb90c49e68e49d2776729b81f95a838572249de4db0dc06da42943f14d1d9f5c33d1588397423d97c8c8a87de802afcca297a095dc8f72879e1c603fc83df76125fc368967ccf3dfcf575a1045138623d87c33271e10c7b0cd1648be48cb2231d7b5c88bdee77e2c73c7a5975c8c3185f3e2f69f61c0b3c07782debb51b8b4d41024c299084c9ebb197ff4c12e8fcd416893cc56c71b75a9ebba74fb10b1c9e6428c6f1231e5a2f673fda9ca5da25c5fc4f45b5e94a0f3e4a17e026aff7f00003e9af3edbb8e23c2712b681ff60994d6537402d8de9943c3cfaf48a1e6e687ab9d953a48bb6891bfe929ce2e9cd4dabf66e26da628185294c4b87b7ed8", 0x10d) 19:21:49 executing program 3: r0 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="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", 0x4d9, 0xffffffffffffffff) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x200, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000440)=[&(0x7f0000000000)={0x4, 0x960000, 0x0, 0x1, 0x0, r1, &(0x7f00000001c0)="10000000080000000002000000000000", 0x10}]) io_destroy(r2) add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$revoke(0x3, r0) r3 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000600)={{0x3, @netrom}, [@remote, @bcast, @rose, @bcast, @default, @netrom, @null, @default]}, &(0x7f0000000680)=0x48, 0x80000) ioctl$sock_ax25_SIOCDELRT(r3, 0x890c, &(0x7f00000006c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, [@default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) r4 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)={0xa4, r4, 0x200, 0x70bd27, 0x0, {}, [@TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x9}, @TIPC_NLA_PUBL_UPPER={0x8}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xf67f}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6}]}, @TIPC_NLA_NET={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x10001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x40}, 0x90) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000780)={0x110, r4, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0xa8, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xdb29}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}]}]}, @TIPC_NLA_NET={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffaf0}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x100000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xd587}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x8814}, 0x240000d4) 19:21:50 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:50 executing program 3: r0 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="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", 0x4d9, 0xffffffffffffffff) keyctl$revoke(0x3, r0) sendmsg$IPCTNL_MSG_CT_GET_DYING(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000040)={0x14, 0x6, 0x1, 0x301, 0x0, 0x0, {0x2, 0x0, 0x7}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20004881) 19:21:50 executing program 3: r0 = add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="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", 0x528, 0xffffffffffffffff) keyctl$revoke(0x3, r0) getsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f0000000640), &(0x7f0000000680)=0x4) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)={'raw\x00'}, &(0x7f0000000600)=0x54) 19:21:50 executing program 3: ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="e9732af69a355544cecb8f7a403138df480158364dfc0bc118710d801669943f01e3cb332f6b8bbeaa133d43a6e992201c8d9b16aa387e841f8de0f68aa3a15d95475cded0860ba450f24b479824ddc0ee5e59fa0b38e3e215d14161752ff0fdcc5d3c70f7d749d7f8dd2a691d6b008b207af750bb72a0cbdd966bc5d4ce4f13760e502996c83cb2b26c3c1a4cf788acb0335f9d3a2f49e5505d389a89141aeff9a76648e728e038331aacd4625972fa1e7ee53db4af796392583e2b46332ead1ca64b1a61c6c54a037fa664fec474ff368f5e86b362e89be77e7eedd328d2ac730df42cf3e12035e1a6d9aceb14813b0d2d2fcc31ea1114831fdd5f8eea79a8061edd8e981c3931b16251fb3270d63d08a98704a4d34553dd649055d20c6b2fd40221e30cd848bed217cb955fdb677cf26906ecf01985ef5088a5eee9f4cdc4a5a487b11b8ab2f3fe2a20dbebc2517778f4b760d1bc5843d41d560fe5a03da209146c2746e1f6d74f5e4a375d764d902c1a0d7f9e2e5321b675006cef60828b37d53b96a3f6d0d0156666c058c2137319966e411e5a700e7e75b7df697d765c00201d2620634a95371378bdf763346dedd41784b13712afa071914c46120ce5c44639d0dd2df7b48eba97f343ae4a3420efaf5a51204fe6f5153358e2e5deb22c8d27649aeb5cffdd86dfd8e280d3c153a0da45d876aa9552f946ae7e106b3052dbfed090eeb2ef0285cc537c40df60b09ba3088d3a56b16358a46921dfa050de3d47b99219c4ad8cfb120c33235fbc38aa95122c7957e707274dd5d1c3ba5fad3a65deed790b66a8b6defa5f66c1470df6ce113a3e10882ef96f5cc158a43aeaa3eb51962600260f639897411e8086a4624bba2452a30f495ddf61a0f1b64e73f84e3ceb29ecfd35f3b8a65582809f19d3ebe6cf217bef5ef65df063f91fa9ba75743fc82afec000cabd4f03463d64bb591b295f03465f677874edece76001cb29450e5bfa0f0b8ccadaaeb8479d2c60bb97f4427df9d44afa7f6bc193c2c043701945238ed30152312f7f4f6b918ee58c2b6294e4d0ad5d162069edfc70cd69b9e8c16eb8afddb0fecda907f10b89af3819b27f0a52454741b01387abedfc06fbb604ce528559310abda22d95dfd7e03cc4fb1b7bb4ab2b0ae9e53405cfd2c92cd789f34daf388ee0d339e952ffc88ddd0697c8ff8d8e8585166de5d90ec866ea85672d7370c1ea7ff4a2cc9796ace372a89024db79de8b9fb86ba3ac4d5488c54558926c10762615f23f3c076ea8b77ae43e5670183c86dae1a29b23462643a18507718215791a7ed248b2b570989e72d546fb206dd2de57d9a2ef41e947792880620b56db96beb1b0d16439778d1bd8a9e33caf1cc5808c36c90e3bd3d5029c523aeb124e0f3bb1bbd72ed506db57b1b2389f939c5277091198fdc6c892af03b24bc5de7907c1d5d317cc22695da2803e9af981674f4e414b14bc13d7cfcfe808f6e077bee1ffdf34f3c1d1e00eebb55608251e387a6e64629f880c480c6408a05fe6787a92320ae3cb6608c72373a472af009de30132d58f5249548351a48cad96867bee901352d992aec439be6309f212a18425d31a8ee816826ce874ea2b2c3aa9e98805d99dacec8e036986ff1dd772d2ea54179d74eac302f6671ce31d58d2b761d6c0f365d541085d6a531c11b2bf45810a43728ada93a156ef5b3b89c46b6cfc477d3677ee1ac06fc78da9c5e2a4b4ae6524f3", 0x4d9, 0xffffffffffffffff) keyctl$revoke(0x3, r0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0xc8380, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f0000000840)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000800)={&(0x7f0000000600)=ANY=[@ANYBLOB="ccfd0100", @ANYRES16=0x0, @ANYBLOB="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"], 0x1cc}, 0x1, 0x0, 0x0, 0x851}, 0x20000000) r2 = creat(&(0x7f0000000880)='./file0\x00', 0x2d) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000a00)='[{\x00') getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@local, @in6=@private0}}, {{@in=@broadcast}, 0x0, @in6=@private2}}, &(0x7f00000009c0)=0xe8) 19:21:50 executing program 3: open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)={0x5e, 0x3ff, "95597cda14506d6075ca56357669efa8aab95468dad882d1e17761bbfa014d17f4a13b07aa9ec41b0eb244430fa6e6a3d541a4fe305dad5acb392a6fa850c3cfe2d744bf8e96ad2ef6ecd4788c7a7559355d17e11f88"}, 0x4000) r0 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="e9732af69a355544cecb8f7a403138df480158364dfc0bc118710d801669943f01e3cb332f6b8bbeaa133d43a6e992201c8d9b16aa387e841f8de0f68aa3a15d95475cded0860ba450f24b479824ddc0ee5e59fa0b38e3e215d14161752ff0fdcc5d3c70f7d749d7f8dd2a691d6b008b207af750bb72a0cbdd966bc5d4ce4f13760e502996c83cb2b26c3c1a4cf788acb0335f9d3a2f49e5505d389a89141aeff9a76648e728e038331aacd4625972fa1e7ee53db4af796392583e2b46332ead1ca64b1a61c6c54a037fa664fec474ff368f5e86b362e89be77e7eedd328d2ac730df42cf3e12035e1a6d9aceb14813b0d2d2fcc31ea1114831fdd5f8eea79a8061edd8e981c3931b16251fb3270d63d08a98704a4d34553dd649055d20c6b2fd40221e30cd848bed217cb955fdb677cf26906ecf01985ef5088a5eee9f4cdc4a5a487b11b8ab2f3fe2a20dbebc2517778f4b760d1bc5843d41d560fe5a03da209146c2746e1f6d74f5e4a375d764d902c1a0d7f9e2e5321b675006cef60828b37d53b96a3f6d0d0156666c058c2137319966e411e5a700e7e75b7df697d765c00201d2620634a95371378bdf763346dedd41784b13712afa071914c46120ce5c44639d0dd2df7b48eba97f343ae4a3420efaf5a51204fe6f5153358e2e5deb22c8d27649aeb5cffdd86dfd8e280d3c153a0da45d876aa9552f946ae7e106b3052dbfed090eeb2ef0285cc537c40df60b09ba3088d3a56b16358a46921dfa050de3d47b99219c4ad8cfb120c33235fbc38aa95122c7957e707274dd5d1c3ba5fad3a65deed790b66a8b6defa5f66c1470df6ce113a3e10882ef96f5cc158a43aeaa3eb51962600260f639897411e8086a4624bba2452a30f495ddf61a0f1b64e73f84e3ceb29ecfd35f3b8a65582809f19d3ebe6cf217bef5ef65df063f91fa9ba75743fc82afec000cabd4f03463d64bb591b295f03465f677874edece76001cb29450e5bfa0f0b8ccadaaeb8479d2c60bb97f4427df9d44afa7f6bc193c2c043701945238ed30152312f7f4f6b918ee58c2b6294e4d0ad5d162069edfc70cd69b9e8c16eb8afddb0fecda907f10b89af3819b27f0a52454741b01387abedfc06fbb604ce528559310abda22d95dfd7e03cc4fb1b7bb4ab2b0ae9e53405cfd2c92cd789f34daf388ee0d339e952ffc88ddd0697c8ff8d8e8585166de5d90ec866ea85672d7370c1ea7ff4a2cc9796ace372a89024db79de8b9fb86ba3ac4d5488c54558926c10762615f23f3c076ea8b77ae43e5670183c86dae1a29b23462643a18507718215791a7ed248b2b570989e72d546fb206dd2de57d9a2ef41e947792880620b56db96beb1b0d16439778d1bd8a9e33caf1cc5808c36c90e3bd3d5029c523aeb124e0f3bb1bbd72ed506db57b1b2389f939c5277091198fdc6c892af03b24bc5de7907c1d5d317cc22695da2803e9af981674f4e414b14bc13d7cfcfe808f6e077bee1ffdf34f3c1d1e00eebb55608251e387a6e64629f880c480c6408a05fe6787a92320ae3cb6608c72373a472af009de30132d58f5249548351a48cad96867bee901352d992aec439be6309f212a18425d31a8ee816826ce874ea2b2c3aa9e98805d99dacec8e036986ff1dd772d2ea54179d74eac302f6671ce31d58d2b761d6c0f365d541085d6a531c11b2bf45810a43728ada93a156ef5b3b89c46b6cfc477d3677ee1ac06fc78da9c5e2a4b4ae6524f3", 0x4d9, 0xffffffffffffffff) keyctl$revoke(0x3, r0) 19:21:50 executing program 3: r0 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="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", 0x4d9, 0xffffffffffffffff) keyctl$revoke(0x3, r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000600)={0xa0, 0x19, 0x1, {0xe90, {0x0, 0x0, 0x3}, 0x40, 0xffffffffffffffff, r1, 0x3f, 0x1, 0x2, 0x7fffffff, 0x7, 0x0, 0x81, 0x9, 0x5, 0x4, 0x7f, 0x0, 0xfffffffffffffff8, 0x20, 0x9}}, 0xa0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ttyS3\x00', 0x420000, 0x0) 19:21:50 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:50 executing program 3: r0 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000600)="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", 0x4d9, 0xffffffffffffffff) keyctl$revoke(0x3, r0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000300)=@pptp={0x18, 0x2, {0x0, @private}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000b00)=""/4096, 0x1000}, {&(0x7f0000000380)=""/208, 0xd0}, {&(0x7f0000000480)=""/190, 0xbe}, {&(0x7f0000000540)}], 0x4, &(0x7f00000005c0)=""/5, 0x5}, 0x62) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000001b40)=ANY=[@ANYBLOB="58017f00", @ANYRES16=r1, @ANYBLOB="00012bbd7000ffdbdf25130000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000000000008000b00030000000600110009000000080001007063690011000200303030303a30303a3130b43000000000080003000000000008000b000800000006001e0076ff00000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000000000008000b00e30000000600110081000000080001007063690011000200303030303a30303a31302e300000000008000300010600110008000000080001007063690011000200303030303a30303a31302e3000000000080003000300000008000b000400000006001100530000000e0001006e657464657673696d0000000f0002006e657400657673696d300000080003000000000008000b00050000000600110007000000c6a0ebb95a01a24bd9e3ca2db103e726631f6c629915248e90e131cb926c5c393ba4c6b184064dfea2b24e9d17e703bcf1ad8520021e4ecde424e837a4c046682ca431183c27584276cafa4e1c64b5bd084745c3acf2bf2274aa25fe133f18827033edc48b91df2df17c6fda003aa1e430d137cc97d8628454e2ac49cd053abb8752ece1b9bd654b44ba39c40abefedb8cb26ce165c07e6f5cb4e0b440bbc95a4a484b28034a68973d4c884bf99024eb747199ea32485061d121a6e482bc377e72b0a623e364004eaa9e250fb878789adffdc84c8a526f00049b817d0e4f07ac728ee01e2134a51cfaa2ead7bf69051a23e14d31ddb3bb2174cd8afc283f9238d15546769c133a4c34ecfc569e0e23f96ca69ca5"], 0x158}, 0x1, 0x0, 0x0, 0x10044804}, 0x20000880) 19:21:50 executing program 3: r0 = request_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000600)='syz', 0xfffffffffffffffa) add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000640)="e9732af69a355544cecb8f7a403138df480158364dfc0bc118710d801669943f01e3cb332f6b8bbeaa133d43a6e992201c8d9b16aa387e841f8de0f68aa3a15d95475cded0860ba450f24b479824ddc0ee5e59fa0b38e3e215d14161752ff0fdcc5d3c70f7d749d7f8dd2a691d6b008b207af750bb72a0cbdd966bc5d4ce4f13760e502996c83cb2b26c3c1a4cf788acb0335f9d3a2f49e5505d389a89141aeff9a76648e728e038331aacd4625972fa1e7ee53db4af796392583e2b46332ead1ca64b1a61c6c54a037fa664fec474ff368f5e86b362e89be77e7eedd328d2ac730df42cf3e12035e1a6d9aceb14813b0d2d2fcc31ea1114831fdd5f8eea79a8061edd8e981c3931b16251fb3270d63d08a98704a4d34553dd649055d20c6b2fd40221e30cd848bed217cb955fdb677cf26906ecf01985ef5088a5eee9f4cdc4a5a487b11b8ab2f3fe2a20dbebc2517778f4b760d1bc5843d41d560fe5a03da209146c2746e1f6d74f5e4a375d764d902c1a0d7f9e2e5321b675006cef60828b37d53b96a3f6d0d0156666c058c2137319966e411e5a700e7e75b7df697d765c00201d2620634a95371378bdf763346dedd41784b13712afa071914c46120ce5c44639d0dd2df7b48eba97f343ae4a3420efaf5a51204fe6f5153358e2e5deb22c8d27649aeb5cffdd86dfd8e280d3c153a0da45d876aa9552f946ae7e106b3052dbfed090eeb2ef0285cc537c40df088d3a56b16358a46921dfa050de3d47b99219c4ad8cfb120c33235fbc38aa95122c7957e707274dd5d1c3ba5fad3a65deed790b66a8b6defa5f6680000000ce113a3e10882ef96f5cc158a43aeaa3eb51962600260f639897411e8086a4624bba2452a30f495ddf61a0f1b64e73f84e3ceb29ecfd35f3b8a65582809f19d3ebe6cf217bef5ef65df063f91fa9ba75743fc82afec000cabd4f03463d64bb591b295f03465f677874edece76001cb29450e5bfa0f0b8ccadaaeb8479d2c60bb97f4427df9d44afa7f6bc193c2c043701945238ed30152312f7f4f6b918ee58c2b6294e4d0ad5d162069edfc70cd69b9e8c16eb8afddb0fecda907f10b89af3819b27f0a52454741b01387abedfc06fbb604ce528559310abda22d95dfd7e03cc4fb1b7bb4ab2b0ae9e53405cfd2c92cd789f34daf388ee0d339e952ffc88ddd0697c8ff8d8e8585166de5d90ec866ea85672d7370c1ea7ff4a2cc9796ace372a89024db79de8b9fb86ba3ac4d5488c54558926c10762615f23f3c076ea8b77ae43e5670183c86dae1a29b23462643a18507718215791a7ed248b2b570989e72d546fb206dd2de57d9a2ef41e947792880620b56db96beb1b0d16439778d1bd8a9e33caf1cc5808c36c90e3bd3d5029c523aeb124e0f3bb1bbd72ed506db57b1b2389f939c5277091198fdc6c892af03b24bc5de7907c1d5d317cc22695da2803e9af981674f4e414b14bc13d7cfcfe808f6e077bee1ffdf34f3c1d1e00eebb55608251e387a6e64629f880c480c6408a05fe6787a92320ae3cb6608c72373a472af009de30132d58f5249548351a48cad96867bee901352d992aec439be6309f212a18425d31a8ee816826ce874ea2b2c3aa9e98805d99dacec8e036986ff1dd772d2ea54179d74eac302f6671ce31d58d2b761d6c0f365d541085d6a531c11b2bf45810a43728ada93a156ef5b3b89c46b6cfc477d3677ee1ac06fc78da9c5e2a4b4ae6524f3d120feafd17f0ed8ab0c9c4b564ddd16fd3af78265c73cb3ba8331", 0x4f0, r0) r1 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="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", 0x4d9, 0xffffffffffffffff) keyctl$revoke(0x3, r1) r2 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="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", 0x4d9, 0xffffffffffffffff) keyctl$revoke(0x3, r2) keyctl$revoke(0x3, r2) 19:21:50 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:50 executing program 3: add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="e9732af69a355544cecb8f7a403138df480158364dfc0bc118710d801669943f01e3cb332f6b8bbeaa133d43a6e992201c8d9b16aa387e841f8de0f68aa3a15d95475cded0860ba450f24b479824ddc0ee5e59fa0b38e3e215d14161752ff0fdcc5d3c70f7d749d7f8dd2a691d6b008b207af750bb72a0cbdd966bc5d4ce4f13760e502996c83cb2b26c3c1a4cf788acb0335f9d3a2f49e5505d389a89141aeff9a76648e728e038331aacd4625972fa1e7ee53db4af796392583e2b46332ead1ca64b1a61c6c54a037fa664fec474ff368f5e86b362e89be77e7eedd328d2ac730df42cf3e12035e1a6d9aceb14813b0d2d2fcc31ea1114831fdd5f8eea79a8061edd8e981c3931b16251fb3270d63d08a98704a4d34553dd649055d20c6b2fd40221e30cd848bed217cb955fdb677cf26906ecf01985ef5088a5eee9f4cdc4a5a487b11b8ab2f3fe2a20dbebc2517778f4b760d1bc5843d41d560fe5a03da209146c2746e1f6d74f5e4a375d764d902c1a0d7f9e2e5321b675006cef60828b37d53b96a3f6d0d0156666c058c2137319966e411e5a700e7e75b7df697d765c00201d2620634a95371378bdf763346dedd41784b13712afa071914c46120ce5c44639d0dd2df7b48eba97f343ae4a3420efaf5a51204fe6f5153358e2e5deb22c8d27649aeb5cffdd86dfd8e280d3c153a0da45d876aa9552f946ae7e106b3052dbfed090eeb2ef0285cc537c40df60b09ba3088d3a56b16358a46921dfa050de3d47b99219c4ad8cfb120c33235fbc38aa95122c7957e707274dd5d1c3ba5fad3a65deed790b66a8b6defa5f66c1470df6ce113a3e10882ef96f5cc158a43aeaa3eb51962600260f639897411e8086a4624bba2452a30f495ddf61a0f1b64e73f84e3ceb29ecfd35f3b8a65582809f19d3ebe6cf217bef5ef65df063f91fa9ba75743fc82afec000cabd4f03463d64bb591b295f03465f677874edece76001cb29450e5bfa0f0b8ccadaaeb8479d2c60bb97f4427df9d44afa7f6bc193c2c043701945238ed30152312f7f4f6b918ee58c2b6294e4d0ad5d162069edfc70cd69b9e8c16eb8afddb0fecda907f10b89af3819b27f0a52454741b01387abedfc06fbb604ce528559310abda22d95dfd7e03cc4fb1b7bb4ab2b0ae9e53405cfd2c92cd789f34daf388ee0d339e952ffc88ddd0697c8ff8d8e8585166de5d90ec866ea85672d7370c1ea7ff4a2cc9796ace372a89024db79de8b9fb86ba3ac4d5488c54558926c10762615f23f3c076ea8b77ae43e5670183c86dae1a29b23462643a18507718215791a7ed248b2b570989e72d546fb206dd2de57d9a2ef41e947792880620b56db96beb1b0d16439778d1bd8a9e33caf1cc5808c36c90e3bd3d5029c523aeb124e0f3bb1bbd72ed506db57b1b2389f939c5277091198fdc6c892af03b24bc5de7907c1d5d317cc22695da2803e9af981674f4e414b14bc13d7cfcfe808f6e077bee1ffdf34f3c1d1e00eebb55608251e387a6e64629f880c480c6408a05fe6787a92320ae3cb6608c72373a472af009de30132d58f5249548351a48cad96867bee901352d992aec439be6309f212a18425d31a8ee816826ce874ea2b2c3aa9e98805d99dacec8e036986ff1dd772d2ea54179d74eac302f6671ce31d58d2b761d6c0f365d541085d6a531c11b2bf45810a43728ada93a156ef5b3b89c46b6cfc477d3677ee1ac06fc78da9c5e2a4b4ae6524f3", 0x4d9, 0xffffffffffffffff) r0 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f0000000bc0)={'syz', 0x3}, &(0x7f0000000600)="e9732af69a355544cecb8f7a403138df480158364dfc0bc118710d801669943f01e3cb332f6b8bbeaa133d43a6e992201c8d9b16aa387e841f8de0f68aa3a15d95475cded0860ba450f24b479824ddc0ee5e59fa0b38e3e215d14161752ff0fdcc5d3c70f7d749d7f8dd2a691d6b008b207af750bb72a0cbdd966bc5d4ce4f13760e502996c83cb2b26c3c1a4cf788acb0335f9d3a2f49e5505d389a89141aeff9a76648e728e038331aacd4625972fa1e7ee53db4af796392583e2b46332ead1ca64b1a61c6c54a037fa664fec474ff368f5e86b362e89be77e7eedd328d2ac730df42cf3e12035e1a6d9aceb14813b0d2d2fcc31ea1114831fdd5f8eea79a8061edd8e981c3931b16251fb3270d63d08a98704a4d34553dd649055d20c6b2fd40221e30cd848bed217cb955fdb677cf26906ecf01985ef5088a5eee9f4cdc4a5a487b11b8ab2f3fe2a20dbebc2517778f4b760d1bc5843d41d560fe5a03da209146c2746e1f6d74f5e4a375d764d902c1a0d7f9e2e5321b675006cef60828b37d53b96a3f6d0d0156666c058c2137319966e411e5a700e7e75b7df697d765c00201d2620634a95371378bdf763346dedd41784b13712afa071914c46120ce5c44639d0dd2df7b48eba97f343ae4a3420efaf5a51204fe6f5153358e2e5deb22c8d27649aeb5cffdd86dfd8e280d3c153a0da45d876aa9552f946ae7e106b3052dbfed090eeb2ef0285cc537c40df60b09ba3088d3a56b16358a46921dfa050de3d47b99219c4ad8cfb120c33235fbc38aa95122c7957e707274dd5d1c3ba5fad3a65deed790b66a8b6defa5f66c1470df6ce113a3e10882ef96f5cc158a43aeaa3eb51962600260f639897411e8086a4624bba2452a30f495ddf61a0f1b64ebe957acbeb29ecfd35f3b8a65582809f19d3ebe6cf217bef5ef65df063f91fa9ba75743fc82afec000cabd4f03463d64bb591b295f03465f677874edece76001cb29450e5bfa0f0b8ccadaaeb8479d2c60bb97f4427df9d44afa7f6bc193c2c043701945238ed30152312f7f4f6b918ee58c2b6294e4d0ad5d162069edfc70cd69b9e8c16eb8afddb0fecda907f10b89af3819b27f0a52454741b01387abedfc06fbb604ce528559310abda22d95dfd7e03cc4fb1b7bb4ab2b0ae9e53405cfd2c92cd789f34daf388ee0d339e952ffc88ddd0697c8ff8d8e8585166de5d90ec866ea85672d7370c1ea7ff4a2cc9796ace372a89024db79de8b9fb86ba3ac4d5488c54558926c10762615f23f3c076ea8b77ae43e5670183c86dae1a29b23462643a18507718215791a7ed248b2b570989e72d546fb206dd2de57d9a2ef41e947792880620b56e33caf1cc5808c36c90e3bd3d5029c523aeb124e0f3bb1bbd72ed506db57b1b2389f939c5277091198fdc6c892af03b24bc5de0b8fc1d5d317cc22695da2803e9af981674f4e414b14bc13d7cfcfe808f6e077bee1ffdf34f3c1d1e00eebb55608251e387a6e64629f880c480c6408a05fe6787a92320ae3cb6608c72373a472af009de30132d58f5249548351a48cad96867bee901352d992aec439be6309f212a18425d31a8ee816826ce874ea2b2c3aa9e98805d99dacec8e036986ff3dd772d2ea54179d74eac302f6671ce31d58d2b761d6c0f365d541085d6a531c11b2bf45810a43728ada93a156ef5b3b89c46b6cfc477d3677ee1ac06fc78da9c5e2a4b4ae6524f36ce0962c5398d50001063deb532f1eb617c17a58a9ed874714c2c3ae7edb5ca5b527b83266387b0da53e6dcdeb413df625d882142d2d5c5bd23aa5e65e754232327e5811b6701d8c9ba60c5caa78aea7c1c0eb1d9d3a5e6e9715ba18140cd38e6c4b6601dc3013651bbd38c1e82ded7b33d2c4691c968ca08e21b11312ae9e05790d3d8e95cf8b0a6d9f08406d73d981eba3d709010fbff208b011c11da5ab5ad254fb8a4bb550e66ccb17498bc0ffd62f23a07e800183b6898952f0c142032196896c12986e24d25700"/1442, 0x5a2, 0xfffffffffffffffc) keyctl$revoke(0x3, r0) r1 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="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", 0x4d9, 0xffffffffffffffff) keyctl$revoke(0x3, r1) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$revoke(0x3, r1) 19:21:50 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:51 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:51 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:51 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:51 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:52 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:52 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:52 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:52 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:52 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:53 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:53 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:53 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:53 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:53 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:53 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:53 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:53 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:53 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:54 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:54 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(0xffffffffffffffff) getpid() 19:21:54 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:54 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:54 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:54 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:54 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:54 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(0xffffffffffffffff) getpid() 19:21:54 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:55 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(0xffffffffffffffff) getpid() 19:21:55 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:55 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(0xffffffffffffffff) getpid() 19:21:55 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:55 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:55 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:55 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:55 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:55 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(0xffffffffffffffff) getpid() 19:21:55 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:56 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:56 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:56 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:56 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:56 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:56 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:56 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:56 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:56 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:56 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:57 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:57 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r0) getpid() 19:21:57 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:57 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:57 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:57 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:57 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) getpid() 19:21:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r0) getpid() 19:21:57 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r0) getpid() 19:21:58 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) getpid() 19:21:58 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:58 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) getpid() 19:21:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r0) getpid() 19:21:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r0) getpid() 19:21:58 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) getpid() 19:21:58 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) getpid() 19:21:58 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r0) getpid() 19:21:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r0) getpid() 19:21:58 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) getpid() 19:21:59 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:21:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r0) getpid() 19:21:59 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) getpid() 19:21:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r0) getpid() 19:21:59 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) getpid() 19:21:59 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) getpid() 19:21:59 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:00 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) getpid() 19:22:00 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) getpid() 19:22:00 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) getpid() 19:22:00 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:00 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:00 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:00 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) getpid() 19:22:01 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) 19:22:01 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:22:01 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:01 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:01 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:22:01 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) 19:22:01 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:22:01 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:01 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) 19:22:01 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) 19:22:01 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:22:01 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) 19:22:02 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) 19:22:02 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:22:02 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) ioperm(0x10000, 0x7fff, 0xfffffffffffffff9) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="09000400c2d56730e4d927746537b442b8caa652fb8b9075a119591d", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300", @ANYRES32=r3, @ANYBLOB], 0x1c}}, 0x0) read$midi(0xffffffffffffffff, &(0x7f0000002040)=""/4097, 0x1001) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) poll(&(0x7f0000002080)=[{r4}], 0x1, 0x5c) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000280)='/dev/bsg\x00', 0x68800, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000300)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r6, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x28, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0x8, 0x3, r7}, @val={0xc, 0x99, {0x5, 0x4b}}}}, ["", "", "", "", "", ""]}, 0x28}}, 0x0) r8 = dup2(r5, r4) ioctl$sock_inet_SIOCSIFADDR(r8, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r8, 0xc02064b9, &(0x7f0000000240)={&(0x7f0000000140)=[0x6, 0x0, 0x7], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x1e68, 0xbbbbbbbb}) 19:22:02 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:22:02 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) 19:22:02 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:22:02 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:22:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r5 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x3f, 0xc0080) poll(&(0x7f0000000240)=[{}, {r5, 0x4463}, {0xffffffffffffffff, 0x8008}, {0xffffffffffffffff, 0x1020}, {r0, 0x22}], 0x5, 0xb) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = dup2(r6, r4) ioctl$sock_inet_SIOCSIFADDR(r7, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) ioctl$SNDCTL_SEQ_GETOUTCOUNT(r7, 0x80045104, &(0x7f0000000100)) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="9d0b00000000000000000c00000008000300", @ANYRES32=r8, @ANYBLOB], 0x1c}}, 0x0) read$midi(0xffffffffffffffff, &(0x7f0000002040)=""/4097, 0x1001) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = dup2(r9, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFADDR(r10, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) setsockopt$bt_l2cap_L2CAP_CONNINFO(r10, 0x6, 0x2, &(0x7f0000000280)={0x20, "b2f081"}, 0x6) 19:22:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r5 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x3f, 0xc0080) poll(&(0x7f0000000240)=[{}, {r5, 0x4463}, {0xffffffffffffffff, 0x8008}, {0xffffffffffffffff, 0x1020}, {r0, 0x22}], 0x5, 0xb) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = dup2(r6, r4) ioctl$sock_inet_SIOCSIFADDR(r7, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) ioctl$SNDCTL_SEQ_GETOUTCOUNT(r7, 0x80045104, &(0x7f0000000100)) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="9d0b00000000000000000c00000008000300", @ANYRES32=r8, @ANYBLOB], 0x1c}}, 0x0) read$midi(0xffffffffffffffff, &(0x7f0000002040)=""/4097, 0x1001) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = dup2(r9, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFADDR(r10, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) setsockopt$bt_l2cap_L2CAP_CONNINFO(r10, 0x6, 0x2, &(0x7f0000000280)={0x20, "b2f081"}, 0x6) 19:22:02 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:02 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:22:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r5 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x3f, 0xc0080) poll(&(0x7f0000000240)=[{}, {r5, 0x4463}, {0xffffffffffffffff, 0x8008}, {0xffffffffffffffff, 0x1020}, {r0, 0x22}], 0x5, 0xb) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = dup2(r6, r4) ioctl$sock_inet_SIOCSIFADDR(r7, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) ioctl$SNDCTL_SEQ_GETOUTCOUNT(r7, 0x80045104, &(0x7f0000000100)) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="9d0b00000000000000000c00000008000300", @ANYRES32=r8, @ANYBLOB], 0x1c}}, 0x0) read$midi(0xffffffffffffffff, &(0x7f0000002040)=""/4097, 0x1001) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = dup2(r9, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFADDR(r10, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) setsockopt$bt_l2cap_L2CAP_CONNINFO(r10, 0x6, 0x2, &(0x7f0000000280)={0x20, "b2f081"}, 0x6) 19:22:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r5 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x3f, 0xc0080) poll(&(0x7f0000000240)=[{}, {r5, 0x4463}, {0xffffffffffffffff, 0x8008}, {0xffffffffffffffff, 0x1020}, {r0, 0x22}], 0x5, 0xb) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = dup2(r6, r4) ioctl$sock_inet_SIOCSIFADDR(r7, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) ioctl$SNDCTL_SEQ_GETOUTCOUNT(r7, 0x80045104, &(0x7f0000000100)) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="9d0b00000000000000000c00000008000300", @ANYRES32=r8, @ANYBLOB], 0x1c}}, 0x0) read$midi(0xffffffffffffffff, &(0x7f0000002040)=""/4097, 0x1001) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = dup2(r9, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFADDR(r10, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) setsockopt$bt_l2cap_L2CAP_CONNINFO(r10, 0x6, 0x2, &(0x7f0000000280)={0x20, "b2f081"}, 0x6) 19:22:02 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:03 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:22:03 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:22:03 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) 19:22:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x5f, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300", @ANYRES32=r3, @ANYBLOB], 0x1c}}, 0x0) prctl$PR_GET_NO_NEW_PRIVS(0x27) read$midi(0xffffffffffffffff, &(0x7f0000002040)=""/4097, 0x1001) 19:22:03 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:22:03 executing program 5: r0 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="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", 0x4d9, 0xffffffffffffffff) keyctl$revoke(0x3, r0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000600)={&(0x7f00000000c0)=@delneigh={0x2c, 0x1d, 0x100, 0x70bd28, 0x25dfdbfc, {0x1c, 0x0, 0x0, 0x0, 0x19, 0xa9, 0x2}, [@NDA_SRC_VNI={0x8, 0xb, 0x5}, @NDA_PROBES={0x8, 0x4, 0x73}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40044000}, 0x900) 19:22:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) readv(r1, &(0x7f0000001400)=[{&(0x7f0000000240)=""/135, 0x87}, {&(0x7f0000000100)=""/79, 0x4f}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/230, 0xe6}], 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="9d0b00000000000000000c00000008000300", @ANYRES32=r4, @ANYBLOB], 0x1c}}, 0x0) read$midi(0xffffffffffffffff, &(0x7f0000002040)=""/4097, 0x1001) 19:22:03 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:22:03 executing program 5: r0 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="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", 0x4d9, 0xffffffffffffffff) keyctl$revoke(0x3, r0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000600)={&(0x7f00000000c0)=@delneigh={0x2c, 0x1d, 0x100, 0x70bd28, 0x25dfdbfc, {0x1c, 0x0, 0x0, 0x0, 0x19, 0xa9, 0x2}, [@NDA_SRC_VNI={0x8, 0xb, 0x5}, @NDA_PROBES={0x8, 0x4, 0x73}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40044000}, 0x900) 19:22:03 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:03 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) syz_open_dev$rtc(&(0x7f0000000380)='/dev/rtc#\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./bus\x00') r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000b40)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000e40)=[{&(0x7f0000000200)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32=r1], 0x40}, {&(0x7f0000000580)=@abs={0x1}, 0x6e, &(0x7f0000000880)=[{}, {&(0x7f0000000700)}, {&(0x7f0000000780)="f6ce5c11138627cebff024f1639d3e643bfaf34f8d01b42cf440d870a53c043d6f728266a283cf2ed42a4514f514b754969277e69464f8e84d6f60a25e525a5efee7143235723dfa38a03591ec52680d6bf67dc9010ff5ad0b71fb5a41c315098a9426ce8bec1920be2448308ddaa5ce5f3e299675e929eb559b8ac49bf34172ef", 0x81}], 0x3, &(0x7f0000000640)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRESOCT=r0, @ANYBLOB="00000000280000000000000001000000010000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c0000000000000001000000020000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100", @ANYRES32, @ANYRES32, @ANYRES32=r1, @ANYRES32, @ANYBLOB="1c0000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x140, 0x8001}], 0x2, 0x20000005) rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000000), &(0x7f0000000040)=0x1) 19:22:03 executing program 5: r0 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="e9732af69a355544cecb8f7a403138df480158364dfc0bc118710d801669943f01e3cb332f6b8bbeaa133d43a6e992201c8d9b16aa387e841f8de0f68aa3a15d95475cded0860ba450f24b479824ddc0ee5e59fa0b38e3e215d14161752ff0fdcc5d3c70f7d749d7f8dd2a691d6b008b207af750bb72a0cbdd966bc5d4ce4f13760e502996c83cb2b26c3c1a4cf788acb0335f9d3a2f49e5505d389a89141aeff9a76648e728e038331aacd4625972fa1e7ee53db4af796392583e2b46332ead1ca64b1a61c6c54a037fa664fec474ff368f5e86b362e89be77e7eedd328d2ac730df42cf3e12035e1a6d9aceb14813b0d2d2fcc31ea1114831fdd5f8eea79a8061edd8e981c3931b16251fb3270d63d08a98704a4d34553dd649055d20c6b2fd40221e30cd848bed217cb955fdb677cf26906ecf01985ef5088a5eee9f4cdc4a5a487b11b8ab2f3fe2a20dbebc2517778f4b760d1bc5843d41d560fe5a03da209146c2746e1f6d74f5e4a375d764d902c1a0d7f9e2e5321b675006cef60828b37d53b96a3f6d0d0156666c058c2137319966e411e5a700e7e75b7df697d765c00201d2620634a95371378bdf763346dedd41784b13712afa071914c46120ce5c44639d0dd2df7b48eba97f343ae4a3420efaf5a51204fe6f5153358e2e5deb22c8d27649aeb5cffdd86dfd8e280d3c153a0da45d876aa9552f946ae7e106b3052dbfed090eeb2ef0285cc537c40df60b09ba3088d3a56b16358a46921dfa050de3d47b99219c4ad8cfb120c33235fbc38aa95122c7957e707274dd5d1c3ba5fad3a65deed790b66a8b6defa5f66c1470df6ce113a3e10882ef96f5cc158a43aeaa3eb51962600260f639897411e8086a4624bba2452a30f495ddf61a0f1b64e73f84e3ceb29ecfd35f3b8a65582809f19d3ebe6cf217bef5ef65df063f91fa9ba75743fc82afec000cabd4f03463d64bb591b295f03465f677874edece76001cb29450e5bfa0f0b8ccadaaeb8479d2c60bb97f4427df9d44afa7f6bc193c2c043701945238ed30152312f7f4f6b918ee58c2b6294e4d0ad5d162069edfc70cd69b9e8c16eb8afddb0fecda907f10b89af3819b27f0a52454741b01387abedfc06fbb604ce528559310abda22d95dfd7e03cc4fb1b7bb4ab2b0ae9e53405cfd2c92cd789f34daf388ee0d339e952ffc88ddd0697c8ff8d8e8585166de5d90ec866ea85672d7370c1ea7ff4a2cc9796ace372a89024db79de8b9fb86ba3ac4d5488c54558926c10762615f23f3c076ea8b77ae43e5670183c86dae1a29b23462643a18507718215791a7ed248b2b570989e72d546fb206dd2de57d9a2ef41e947792880620b56db96beb1b0d16439778d1bd8a9e33caf1cc5808c36c90e3bd3d5029c523aeb124e0f3bb1bbd72ed506db57b1b2389f939c5277091198fdc6c892af03b24bc5de7907c1d5d317cc22695da2803e9af981674f4e414b14bc13d7cfcfe808f6e077bee1ffdf34f3c1d1e00eebb55608251e387a6e64629f880c480c6408a05fe6787a92320ae3cb6608c72373a472af009de30132d58f5249548351a48cad96867bee901352d992aec439be6309f212a18425d31a8ee816826ce874ea2b2c3aa9e98805d99dacec8e036986ff1dd772d2ea54179d74eac302f6671ce31d58d2b761d6c0f365d541085d6a531c11b2bf45810a43728ada93a156ef5b3b89c46b6cfc477d3677ee1ac06fc78da9c5e2a4b4ae6524f3", 0x4d9, 0xffffffffffffffff) keyctl$revoke(0x3, r0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000600)={&(0x7f00000000c0)=@delneigh={0x2c, 0x1d, 0x100, 0x70bd28, 0x25dfdbfc, {0x1c, 0x0, 0x0, 0x0, 0x19, 0xa9, 0x2}, [@NDA_SRC_VNI={0x8, 0xb, 0x5}, @NDA_PROBES={0x8, 0x4, 0x73}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40044000}, 0x900) 19:22:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300", @ANYRES32=r3, @ANYBLOB="e114a7665aca90daf3baf8ff"], 0x1c}}, 0x0) read$midi(0xffffffffffffffff, &(0x7f0000002040)=""/4097, 0x1001) 19:22:03 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) [ 192.303986] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 19:22:03 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r4, 0xc4009420, 0x0) semget$private(0x0, 0x207, 0x0) semop(0x0, &(0x7f0000000040)=[{0x4, 0x9, 0x800}, {}, {0x3, 0xa5c, 0x1800}, {0x0, 0x5, 0x1000}], 0x4) mknod$loop(0x0, 0x2, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f00000010c0)='./file0\x00', 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001180)="741f083be80b491409758d5a2ac633fad2c3cadc1c8351ab05b9050a5f4b6c0f619ba142e4d201dfc81bebe60a00d635f0c6dbe6177609cae215347f64cfdc9993e1920083f1a10e1bb7ae88fa9d36a8aa34ed7a8b7eb218789bd9bd766590d5d9dfb6c5d5dc2a0583d57e60aa1b54ab8bdd145e63dbb5f7a90acc392582cdd84255270db40c88bd97f4818ff0782fdc8379da6730feee816512a58f7dcd614fc5a1cb299193ef38253602c86bf8731fbea682e44d6e0c034981e83f1795c9de4841f8ae134f14e78b63564535220253", 0xd0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be0e044a2b6e9e71101ba33df3b7d3d8ef3105e5cc295c7b2f1e77666c10273a", 0xac, 0x9}, {&(0x7f0000001480), 0x0, 0x20200}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c746701fb11fbff44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b96", @ANYRESDEC, @ANYRESDEC=0xee00, @ANYBLOB=',appraise,\x00']) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 19:22:03 executing program 5: r0 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="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", 0x4d9, 0xffffffffffffffff) keyctl$revoke(0x3, r0) 19:22:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r4, 0xc4009420, 0x0) semget$private(0x0, 0x207, 0x0) semop(0x0, &(0x7f0000000040)=[{0x4, 0x9, 0x800}, {}, {0x3, 0xa5c, 0x1800}, {0x0, 0x5, 0x1000}], 0x4) mknod$loop(0x0, 0x2, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f00000010c0)='./file0\x00', 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001180)="741f083be80b491409758d5a2ac633fad2c3cadc1c8351ab05b9050a5f4b6c0f619ba142e4d201dfc81bebe60a00d635f0c6dbe6177609cae215347f64cfdc9993e1920083f1a10e1bb7ae88fa9d36a8aa34ed7a8b7eb218789bd9bd766590d5d9dfb6c5d5dc2a0583d57e60aa1b54ab8bdd145e63dbb5f7a90acc392582cdd84255270db40c88bd97f4818ff0782fdc8379da6730feee816512a58f7dcd614fc5a1cb299193ef38253602c86bf8731fbea682e44d6e0c034981e83f1795c9de4841f8ae134f14e78b63564535220253", 0xd0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be0e044a2b6e9e71101ba33df3b7d3d8ef3105e5cc295c7b2f1e77666c10273a", 0xac, 0x9}, {&(0x7f0000001480), 0x0, 0x20200}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c746701fb11fbff44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b96", @ANYRESDEC, @ANYRESDEC=0xee00, @ANYBLOB=',appraise,\x00']) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 19:22:04 executing program 5: keyctl$revoke(0x3, 0x0) 19:22:04 executing program 5: keyctl$revoke(0x3, 0x0) 19:22:04 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:22:04 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:04 executing program 5: keyctl$revoke(0x3, 0x0) 19:22:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r4, 0xc4009420, 0x0) semget$private(0x0, 0x207, 0x0) semop(0x0, &(0x7f0000000040)=[{0x4, 0x9, 0x800}, {}, {0x3, 0xa5c, 0x1800}, {0x0, 0x5, 0x1000}], 0x4) mknod$loop(0x0, 0x2, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f00000010c0)='./file0\x00', 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001180)="741f083be80b491409758d5a2ac633fad2c3cadc1c8351ab05b9050a5f4b6c0f619ba142e4d201dfc81bebe60a00d635f0c6dbe6177609cae215347f64cfdc9993e1920083f1a10e1bb7ae88fa9d36a8aa34ed7a8b7eb218789bd9bd766590d5d9dfb6c5d5dc2a0583d57e60aa1b54ab8bdd145e63dbb5f7a90acc392582cdd84255270db40c88bd97f4818ff0782fdc8379da6730feee816512a58f7dcd614fc5a1cb299193ef38253602c86bf8731fbea682e44d6e0c034981e83f1795c9de4841f8ae134f14e78b63564535220253", 0xd0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be0e044a2b6e9e71101ba33df3b7d3d8ef3105e5cc295c7b2f1e77666c10273a", 0xac, 0x9}, {&(0x7f0000001480), 0x0, 0x20200}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c746701fb11fbff44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b96", @ANYRESDEC, @ANYRESDEC=0xee00, @ANYBLOB=',appraise,\x00']) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 19:22:04 executing program 5: r0 = add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="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", 0x4d9, 0xffffffffffffffff) keyctl$revoke(0x3, r0) 19:22:04 executing program 5: r0 = add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="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", 0x4d9, 0xffffffffffffffff) keyctl$revoke(0x3, r0) 19:22:04 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 19:22:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r4, 0xc4009420, 0x0) semget$private(0x0, 0x207, 0x0) semop(0x0, &(0x7f0000000040)=[{0x4, 0x9, 0x800}, {}, {0x3, 0xa5c, 0x1800}, {0x0, 0x5, 0x1000}], 0x4) mknod$loop(0x0, 0x2, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f00000010c0)='./file0\x00', 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001180)="741f083be80b491409758d5a2ac633fad2c3cadc1c8351ab05b9050a5f4b6c0f619ba142e4d201dfc81bebe60a00d635f0c6dbe6177609cae215347f64cfdc9993e1920083f1a10e1bb7ae88fa9d36a8aa34ed7a8b7eb218789bd9bd766590d5d9dfb6c5d5dc2a0583d57e60aa1b54ab8bdd145e63dbb5f7a90acc392582cdd84255270db40c88bd97f4818ff0782fdc8379da6730feee816512a58f7dcd614fc5a1cb299193ef38253602c86bf8731fbea682e44d6e0c034981e83f1795c9de4841f8ae134f14e78b63564535220253", 0xd0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be0e044a2b6e9e71101ba33df3b7d3d8ef3105e5cc295c7b2f1e77666c10273a", 0xac, 0x9}, {&(0x7f0000001480), 0x0, 0x20200}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c746701fb11fbff44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b96", @ANYRESDEC, @ANYRESDEC=0xee00, @ANYBLOB=',appraise,\x00']) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 19:22:04 executing program 5: r0 = add_key(0x0, &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="e9732af69a355544cecb8f7a403138df480158364dfc0bc118710d801669943f01e3cb332f6b8bbeaa133d43a6e992201c8d9b16aa387e841f8de0f68aa3a15d95475cded0860ba450f24b479824ddc0ee5e59fa0b38e3e215d14161752ff0fdcc5d3c70f7d749d7f8dd2a691d6b008b207af750bb72a0cbdd966bc5d4ce4f13760e502996c83cb2b26c3c1a4cf788acb0335f9d3a2f49e5505d389a89141aeff9a76648e728e038331aacd4625972fa1e7ee53db4af796392583e2b46332ead1ca64b1a61c6c54a037fa664fec474ff368f5e86b362e89be77e7eedd328d2ac730df42cf3e12035e1a6d9aceb14813b0d2d2fcc31ea1114831fdd5f8eea79a8061edd8e981c3931b16251fb3270d63d08a98704a4d34553dd649055d20c6b2fd40221e30cd848bed217cb955fdb677cf26906ecf01985ef5088a5eee9f4cdc4a5a487b11b8ab2f3fe2a20dbebc2517778f4b760d1bc5843d41d560fe5a03da209146c2746e1f6d74f5e4a375d764d902c1a0d7f9e2e5321b675006cef60828b37d53b96a3f6d0d0156666c058c2137319966e411e5a700e7e75b7df697d765c00201d2620634a95371378bdf763346dedd41784b13712afa071914c46120ce5c44639d0dd2df7b48eba97f343ae4a3420efaf5a51204fe6f5153358e2e5deb22c8d27649aeb5cffdd86dfd8e280d3c153a0da45d876aa9552f946ae7e106b3052dbfed090eeb2ef0285cc537c40df60b09ba3088d3a56b16358a46921dfa050de3d47b99219c4ad8cfb120c33235fbc38aa95122c7957e707274dd5d1c3ba5fad3a65deed790b66a8b6defa5f66c1470df6ce113a3e10882ef96f5cc158a43aeaa3eb51962600260f639897411e8086a4624bba2452a30f495ddf61a0f1b64e73f84e3ceb29ecfd35f3b8a65582809f19d3ebe6cf217bef5ef65df063f91fa9ba75743fc82afec000cabd4f03463d64bb591b295f03465f677874edece76001cb29450e5bfa0f0b8ccadaaeb8479d2c60bb97f4427df9d44afa7f6bc193c2c043701945238ed30152312f7f4f6b918ee58c2b6294e4d0ad5d162069edfc70cd69b9e8c16eb8afddb0fecda907f10b89af3819b27f0a52454741b01387abedfc06fbb604ce528559310abda22d95dfd7e03cc4fb1b7bb4ab2b0ae9e53405cfd2c92cd789f34daf388ee0d339e952ffc88ddd0697c8ff8d8e8585166de5d90ec866ea85672d7370c1ea7ff4a2cc9796ace372a89024db79de8b9fb86ba3ac4d5488c54558926c10762615f23f3c076ea8b77ae43e5670183c86dae1a29b23462643a18507718215791a7ed248b2b570989e72d546fb206dd2de57d9a2ef41e947792880620b56db96beb1b0d16439778d1bd8a9e33caf1cc5808c36c90e3bd3d5029c523aeb124e0f3bb1bbd72ed506db57b1b2389f939c5277091198fdc6c892af03b24bc5de7907c1d5d317cc22695da2803e9af981674f4e414b14bc13d7cfcfe808f6e077bee1ffdf34f3c1d1e00eebb55608251e387a6e64629f880c480c6408a05fe6787a92320ae3cb6608c72373a472af009de30132d58f5249548351a48cad96867bee901352d992aec439be6309f212a18425d31a8ee816826ce874ea2b2c3aa9e98805d99dacec8e036986ff1dd772d2ea54179d74eac302f6671ce31d58d2b761d6c0f365d541085d6a531c11b2bf45810a43728ada93a156ef5b3b89c46b6cfc477d3677ee1ac06fc78da9c5e2a4b4ae6524f3", 0x4d9, 0xffffffffffffffff) keyctl$revoke(0x3, r0) 19:22:04 executing program 5: r0 = add_key(&(0x7f0000000000)='cifs.spnego\x00', 0x0, &(0x7f0000000100)="e9732af69a355544cecb8f7a403138df480158364dfc0bc118710d801669943f01e3cb332f6b8bbeaa133d43a6e992201c8d9b16aa387e841f8de0f68aa3a15d95475cded0860ba450f24b479824ddc0ee5e59fa0b38e3e215d14161752ff0fdcc5d3c70f7d749d7f8dd2a691d6b008b207af750bb72a0cbdd966bc5d4ce4f13760e502996c83cb2b26c3c1a4cf788acb0335f9d3a2f49e5505d389a89141aeff9a76648e728e038331aacd4625972fa1e7ee53db4af796392583e2b46332ead1ca64b1a61c6c54a037fa664fec474ff368f5e86b362e89be77e7eedd328d2ac730df42cf3e12035e1a6d9aceb14813b0d2d2fcc31ea1114831fdd5f8eea79a8061edd8e981c3931b16251fb3270d63d08a98704a4d34553dd649055d20c6b2fd40221e30cd848bed217cb955fdb677cf26906ecf01985ef5088a5eee9f4cdc4a5a487b11b8ab2f3fe2a20dbebc2517778f4b760d1bc5843d41d560fe5a03da209146c2746e1f6d74f5e4a375d764d902c1a0d7f9e2e5321b675006cef60828b37d53b96a3f6d0d0156666c058c2137319966e411e5a700e7e75b7df697d765c00201d2620634a95371378bdf763346dedd41784b13712afa071914c46120ce5c44639d0dd2df7b48eba97f343ae4a3420efaf5a51204fe6f5153358e2e5deb22c8d27649aeb5cffdd86dfd8e280d3c153a0da45d876aa9552f946ae7e106b3052dbfed090eeb2ef0285cc537c40df60b09ba3088d3a56b16358a46921dfa050de3d47b99219c4ad8cfb120c33235fbc38aa95122c7957e707274dd5d1c3ba5fad3a65deed790b66a8b6defa5f66c1470df6ce113a3e10882ef96f5cc158a43aeaa3eb51962600260f639897411e8086a4624bba2452a30f495ddf61a0f1b64e73f84e3ceb29ecfd35f3b8a65582809f19d3ebe6cf217bef5ef65df063f91fa9ba75743fc82afec000cabd4f03463d64bb591b295f03465f677874edece76001cb29450e5bfa0f0b8ccadaaeb8479d2c60bb97f4427df9d44afa7f6bc193c2c043701945238ed30152312f7f4f6b918ee58c2b6294e4d0ad5d162069edfc70cd69b9e8c16eb8afddb0fecda907f10b89af3819b27f0a52454741b01387abedfc06fbb604ce528559310abda22d95dfd7e03cc4fb1b7bb4ab2b0ae9e53405cfd2c92cd789f34daf388ee0d339e952ffc88ddd0697c8ff8d8e8585166de5d90ec866ea85672d7370c1ea7ff4a2cc9796ace372a89024db79de8b9fb86ba3ac4d5488c54558926c10762615f23f3c076ea8b77ae43e5670183c86dae1a29b23462643a18507718215791a7ed248b2b570989e72d546fb206dd2de57d9a2ef41e947792880620b56db96beb1b0d16439778d1bd8a9e33caf1cc5808c36c90e3bd3d5029c523aeb124e0f3bb1bbd72ed506db57b1b2389f939c5277091198fdc6c892af03b24bc5de7907c1d5d317cc22695da2803e9af981674f4e414b14bc13d7cfcfe808f6e077bee1ffdf34f3c1d1e00eebb55608251e387a6e64629f880c480c6408a05fe6787a92320ae3cb6608c72373a472af009de30132d58f5249548351a48cad96867bee901352d992aec439be6309f212a18425d31a8ee816826ce874ea2b2c3aa9e98805d99dacec8e036986ff1dd772d2ea54179d74eac302f6671ce31d58d2b761d6c0f365d541085d6a531c11b2bf45810a43728ada93a156ef5b3b89c46b6cfc477d3677ee1ac06fc78da9c5e2a4b4ae6524f3", 0x4d9, 0xffffffffffffffff) keyctl$revoke(0x3, r0) 19:22:04 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r4, 0xc4009420, 0x0) semget$private(0x0, 0x207, 0x0) semop(0x0, &(0x7f0000000040)=[{0x4, 0x9, 0x800}, {}, {0x3, 0xa5c, 0x1800}, {0x0, 0x5, 0x1000}], 0x4) mknod$loop(0x0, 0x2, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f00000010c0)='./file0\x00', 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001180)="741f083be80b491409758d5a2ac633fad2c3cadc1c8351ab05b9050a5f4b6c0f619ba142e4d201dfc81bebe60a00d635f0c6dbe6177609cae215347f64cfdc9993e1920083f1a10e1bb7ae88fa9d36a8aa34ed7a8b7eb218789bd9bd766590d5d9dfb6c5d5dc2a0583d57e60aa1b54ab8bdd145e63dbb5f7a90acc392582cdd84255270db40c88bd97f4818ff0782fdc8379da6730feee816512a58f7dcd614fc5a1cb299193ef38253602c86bf8731fbea682e44d6e0c034981e83f1795c9de4841f8ae134f14e78b63564535220253", 0xd0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be0e044a2b6e9e71101ba33df3b7d3d8ef3105e5cc295c7b2f1e77666c10273a", 0xac, 0x9}, {&(0x7f0000001480), 0x0, 0x20200}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c746701fb11fbff44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b96", @ANYRESDEC, @ANYRESDEC=0xee00, @ANYBLOB=',appraise,\x00']) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 19:22:04 executing program 5: r0 = add_key(&(0x7f0000000000)='cifs.spnego\x00', 0x0, &(0x7f0000000100)="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", 0x4d9, 0xffffffffffffffff) keyctl$revoke(0x3, r0) 19:22:04 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r4, 0xc4009420, 0x0) semget$private(0x0, 0x207, 0x0) semop(0x0, &(0x7f0000000040)=[{0x4, 0x9, 0x800}, {}, {0x3, 0xa5c, 0x1800}, {0x0, 0x5, 0x1000}], 0x4) mknod$loop(0x0, 0x2, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f00000010c0)='./file0\x00', 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001180)="741f083be80b491409758d5a2ac633fad2c3cadc1c8351ab05b9050a5f4b6c0f619ba142e4d201dfc81bebe60a00d635f0c6dbe6177609cae215347f64cfdc9993e1920083f1a10e1bb7ae88fa9d36a8aa34ed7a8b7eb218789bd9bd766590d5d9dfb6c5d5dc2a0583d57e60aa1b54ab8bdd145e63dbb5f7a90acc392582cdd84255270db40c88bd97f4818ff0782fdc8379da6730feee816512a58f7dcd614fc5a1cb299193ef38253602c86bf8731fbea682e44d6e0c034981e83f1795c9de4841f8ae134f14e78b63564535220253", 0xd0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be0e044a2b6e9e71101ba33df3b7d3d8ef3105e5cc295c7b2f1e77666c10273a", 0xac, 0x9}, {&(0x7f0000001480), 0x0, 0x20200}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c746701fb11fbff44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b96", @ANYRESDEC, @ANYRESDEC=0xee00, @ANYBLOB=',appraise,\x00']) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 19:22:04 executing program 5: r0 = add_key(&(0x7f0000000000)='cifs.spnego\x00', 0x0, &(0x7f0000000100)="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", 0x4d9, 0xffffffffffffffff) keyctl$revoke(0x3, r0) 19:22:05 executing program 5: r0 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$revoke(0x3, r0) 19:22:05 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r4, 0xc4009420, 0x0) semget$private(0x0, 0x207, 0x0) semop(0x0, &(0x7f0000000040)=[{0x4, 0x9, 0x800}, {}, {0x3, 0xa5c, 0x1800}, {0x0, 0x5, 0x1000}], 0x4) mknod$loop(0x0, 0x2, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f00000010c0)='./file0\x00', 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001180)="741f083be80b491409758d5a2ac633fad2c3cadc1c8351ab05b9050a5f4b6c0f619ba142e4d201dfc81bebe60a00d635f0c6dbe6177609cae215347f64cfdc9993e1920083f1a10e1bb7ae88fa9d36a8aa34ed7a8b7eb218789bd9bd766590d5d9dfb6c5d5dc2a0583d57e60aa1b54ab8bdd145e63dbb5f7a90acc392582cdd84255270db40c88bd97f4818ff0782fdc8379da6730feee816512a58f7dcd614fc5a1cb299193ef38253602c86bf8731fbea682e44d6e0c034981e83f1795c9de4841f8ae134f14e78b63564535220253", 0xd0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be0e044a2b6e9e71101ba33df3b7d3d8ef3105e5cc295c7b2f1e77666c10273a", 0xac, 0x9}, {&(0x7f0000001480), 0x0, 0x20200}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c746701fb11fbff44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b96", @ANYRESDEC, @ANYRESDEC=0xee00, @ANYBLOB=',appraise,\x00']) 19:22:05 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:05 executing program 5: add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$revoke(0x3, 0x0) 19:22:05 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:05 executing program 5: add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$revoke(0x3, 0x0) 19:22:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r4, 0xc4009420, 0x0) semget$private(0x0, 0x207, 0x0) semop(0x0, &(0x7f0000000040)=[{0x4, 0x9, 0x800}, {}, {0x3, 0xa5c, 0x1800}, {0x0, 0x5, 0x1000}], 0x4) mknod$loop(0x0, 0x2, 0x0) 19:22:05 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:05 executing program 5: add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$revoke(0x3, 0x0) 19:22:05 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r4, 0xc4009420, 0x0) semget$private(0x0, 0x207, 0x0) semop(0x0, &(0x7f0000000040)=[{0x4, 0x9, 0x800}, {}, {0x3, 0xa5c, 0x1800}, {0x0, 0x5, 0x1000}], 0x4) mknod$loop(0x0, 0x2, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f00000010c0)='./file0\x00', 0x0, 0x5, &(0x7f0000001640)=[{&(0x7f0000001180)="741f083be80b491409758d5a2ac633fad2c3cadc1c8351ab05b9050a5f4b6c0f619ba142e4d201dfc81bebe60a00d635f0c6dbe6177609cae215347f64cfdc9993e1920083f1a10e1bb7ae88fa9d36a8aa34ed7a8b7eb218789bd9bd766590d5d9dfb6c5d5dc2a0583d57e60aa1b54ab8bdd145e63dbb5f7a90acc392582cdd84255270db40c88bd97f4818ff0782fdc8379da6730feee816512a58f7dcd614fc5a1cb299193ef38253602c86bf8731fbea682e44d6e0c034981e83f1795c9de4841f8ae134f14e78b63564535220253", 0xd0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be0e044a2b6e9e71101ba33df3b7d3d8ef3105e5cc295c7b2f1e77666c10273a", 0xac, 0x9}, {&(0x7f0000001480), 0x0, 0x20200}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c746701fb11fbff44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b96", @ANYRESDEC, @ANYRESDEC=0xee00, @ANYBLOB=',appraise,\x00']) 19:22:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r4, 0xc4009420, 0x0) semget$private(0x0, 0x207, 0x0) semop(0x0, &(0x7f0000000040)=[{0x4, 0x9, 0x800}, {}, {0x3, 0xa5c, 0x1800}, {0x0, 0x5, 0x1000}], 0x4) mknod$loop(0x0, 0x2, 0x0) 19:22:06 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:06 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:06 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r4, 0xc4009420, 0x0) semget$private(0x0, 0x207, 0x0) semop(0x0, &(0x7f0000000040)=[{0x4, 0x9, 0x800}, {}, {0x3, 0xa5c, 0x1800}, {0x0, 0x5, 0x1000}], 0x4) mknod$loop(0x0, 0x2, 0x0) 19:22:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r4, 0xc4009420, 0x0) semget$private(0x0, 0x207, 0x0) semop(0x0, &(0x7f0000000040)=[{0x4, 0x9, 0x800}, {}, {0x3, 0xa5c, 0x1800}, {0x0, 0x5, 0x1000}], 0x4) mknod$loop(0x0, 0x2, 0x0) 19:22:06 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:06 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:06 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:06 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:06 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r4, 0xc4009420, 0x0) semget$private(0x0, 0x207, 0x0) semop(0x0, &(0x7f0000000040)=[{0x4, 0x9, 0x800}, {}, {0x3, 0xa5c, 0x1800}, {0x0, 0x5, 0x1000}], 0x4) 19:22:07 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:07 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:07 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:07 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r4, 0xc4009420, 0x0) semget$private(0x0, 0x207, 0x0) 19:22:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r4, 0xc4009420, 0x0) semget$private(0x0, 0x207, 0x0) semop(0x0, &(0x7f0000000040)=[{0x4, 0x9, 0x800}, {}, {0x3, 0xa5c, 0x1800}, {0x0, 0x5, 0x1000}], 0x4) 19:22:07 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r4, 0xc4009420, 0x0) 19:22:07 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r4, 0xc4009420, 0x0) 19:22:08 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:08 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) 19:22:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r4, 0xc4009420, 0x0) 19:22:08 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:08 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:08 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) 19:22:09 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) 19:22:09 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:09 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) 19:22:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r4, 0xc4009420, 0x0) 19:22:09 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) 19:22:09 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r4, 0xc4009420, 0x0) 19:22:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) 19:22:09 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) 19:22:10 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) 19:22:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) 19:22:10 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:10 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) 19:22:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) 19:22:10 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) getpid() 19:22:11 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) 19:22:11 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) 19:22:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) 19:22:11 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) getpid() 19:22:11 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) 19:22:11 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) 19:22:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) 19:22:12 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:12 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) getpid() 19:22:12 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) 19:22:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) 19:22:12 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) getpid() 19:22:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 19:22:12 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:12 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x20600) 19:22:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00'}) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0xf8, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffb91f, 0x3d63}, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 19:22:13 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) getpid() 19:22:13 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32=r3, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:13 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00'}) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00'}) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:13 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:13 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) getpid() 19:22:13 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00'}) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:13 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:13 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x0, 0x81}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000033c0)='batadv\x00') sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:14 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:14 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:14 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:14 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:14 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:14 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:14 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:14 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:14 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:15 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:15 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:15 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:15 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:15 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:15 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:15 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:15 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup(0xffffffffffffffff) 19:22:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:15 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:15 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:15 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:15 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:15 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:16 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup(0xffffffffffffffff) 19:22:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:16 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:16 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFBR(r0, 0x8941, 0x0) 19:22:16 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFBR(r0, 0x8941, 0x0) 19:22:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:16 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup(0xffffffffffffffff) 19:22:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFBR(r0, 0x8941, 0x0) 19:22:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:16 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:16 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, 0x0, 0x5}) 19:22:16 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, 0x0, 0x5}) 19:22:16 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:16 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, 0x0, 0x5}) 19:22:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, 0x0, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, 0x0, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:17 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196}) 19:22:17 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, 0x0, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196}) 19:22:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196}) 19:22:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, 0x0, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:17 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:17 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, 0x0, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:17 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:17 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:17 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, 0x0, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, 0x0, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, 0x0) 19:22:17 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:17 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, 0x0, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, 0x0) 19:22:17 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, 0x0, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, 0x0) 19:22:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, 0x0, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, 0x0, 0x5}) 19:22:17 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:18 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, 0x0, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, 0x0, 0x5}) 19:22:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, 0x0, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, 0x0, 0x5}) 19:22:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, 0x0, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:18 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, 0x0, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196}) 19:22:18 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, 0x0, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196}) 19:22:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, 0x0, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196}) 19:22:18 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(0xffffffffffffffff) getpid() 19:22:18 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:18 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:18 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:18 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(0xffffffffffffffff) getpid() 19:22:18 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(0xffffffffffffffff) getpid() 19:22:18 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:18 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:18 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:19 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:19 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:19 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:19 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:19 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:19 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:19 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="9d0b00000000000000000c00000008000300030f57e912ff6470a34182e2c35959e74e376c4a0846e117a6a3c2715e34cca0588e23feb650f93863bb20ff6bd735a44e17721ef476af26273c4e7d95b1c3eff2076da122d492ed2aec7eb80aeb2c98ec13cf8eea864d2fb2bbe8d89d5c0ed801d9c1f1e35f422d8f50ed7207369310f4dafaf4c00fe901c5282d7baab4d446ca3f929f49322a01f5635ed85ea7a5814eb27e43b7cfd9d701fc888efb4c65769114133d82868d8000"/198, @ANYRES32, @ANYBLOB="7d0167f875adbb80b168730bbe75d8c715cbc1c4f43adb1cdb47695b156a6ed577aae45a3682ad2e6b989767db5494149fffc72380efacd206476509f2af052948e46a16bb359065a313df2cd5359e6988dd50cd09e2641af6473bd4cb8c3069bc37dc31c45435a705"], 0x1c}}, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000340)=""/196, 0x5}) 19:22:19 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:19 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r0) getpid() 19:22:19 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r0) getpid() 19:22:19 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:19 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:19 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r0) getpid() 19:22:20 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:20 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:20 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:20 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:20 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:20 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:20 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:20 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:20 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:20 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:21 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:21 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:21 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:21 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:21 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:21 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:21 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:21 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:21 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:21 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {0x0, 0x0, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:21 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:21 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:22 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:22 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:22 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:22 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:22 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {0x0, 0x0, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:22 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:22 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:22 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:22 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:22 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {0x0, 0x0, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:22 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:22 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:22 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x3, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:22 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:23 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {0x0, 0x0, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:23 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000), 0x0, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:23 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:23 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:23 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {0x0, 0x0, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:23 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {0x0, 0x0, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:23 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:23 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000), 0x0, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:23 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:23 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {0x0, 0x0, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:23 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:23 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {0x0, 0x0, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:23 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:23 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {0x0, 0x0, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:24 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000), 0x0, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:24 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:24 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {0x0, 0x0, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:24 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:24 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {0x0, 0x0, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:24 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d394cd7f969aff155a74", 0x12, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) dup(r0) 19:22:24 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:24 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d3", 0x9, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:24 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000), 0x0, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:24 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000), 0x0, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() [ 213.576874] kasan: CONFIG_KASAN_INLINE enabled [ 213.581724] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 213.606346] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 213.612586] Modules linked in: [ 213.615771] CPU: 1 PID: 7997 Comm: syz-executor.0 Not tainted 4.14.213-syzkaller #0 [ 213.623549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 213.632914] task: ffff8880b3078480 task.stack: ffff8880957f8000 [ 213.638963] RIP: 0010:kobject_uevent_env+0xb2/0xf40 [ 213.643963] RSP: 0018:ffff8880957ffb28 EFLAGS: 00010206 [ 213.649420] RAX: 0000000000000018 RBX: 0000000000000002 RCX: 1ffff1101660f1a6 [ 213.656682] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00000000000000c0 [ 213.663948] RBP: ffff888093d57010 R08: ffffffff8b9a7ee0 R09: 0000000000000001 [ 213.671209] R10: 0000000000000000 R11: ffff8880b3078480 R12: 00000000000000a0 [ 213.678466] R13: dffffc0000000000 R14: ffff888093d56f08 R15: 00000000000000a0 [ 213.685721] FS: 0000000002c40940(0000) GS:ffff8880ba500000(0000) knlGS:0000000000000000 [ 213.693935] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 213.699801] CR2: 00000000015a0004 CR3: 00000000a2031000 CR4: 00000000001406e0 [ 213.707060] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 213.714317] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 213.721574] Call Trace: [ 213.724156] ? lock_downgrade+0x740/0x740 [ 213.728303] loop_clr_fd+0x59f/0xc20 [ 213.732010] lo_ioctl+0x895/0x1cd0 [ 213.735541] ? path_lookupat+0x780/0x780 [ 213.739594] ? debug_check_no_obj_freed+0x2c0/0x674 [ 213.744598] ? loop_set_status64+0xe0/0xe0 [ 213.748825] blkdev_ioctl+0x540/0x1830 [ 213.752706] ? blkpg_ioctl+0x8d0/0x8d0 [ 213.756586] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 213.761675] ? debug_check_no_obj_freed+0x2c0/0x674 [ 213.766681] block_ioctl+0xd9/0x120 [ 213.770296] ? blkdev_fallocate+0x3a0/0x3a0 [ 213.774604] do_vfs_ioctl+0x75a/0xff0 [ 213.778394] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 213.783830] ? ioctl_preallocate+0x1a0/0x1a0 [ 213.788225] ? kmem_cache_free+0x23a/0x2b0 [ 213.792443] ? putname+0xcd/0x110 [ 213.795884] ? do_sys_open+0x208/0x410 [ 213.799764] ? filp_open+0x60/0x60 [ 213.803296] ? security_file_ioctl+0x83/0xb0 [ 213.807927] SyS_ioctl+0x7f/0xb0 [ 213.811282] ? do_vfs_ioctl+0xff0/0xff0 [ 213.815245] do_syscall_64+0x1d5/0x640 [ 213.819127] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 213.824306] RIP: 0033:0x45e087 [ 213.827486] RSP: 002b:00007ffd5769ef88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 213.835187] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e087 [ 213.842445] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000003 [ 213.849705] RBP: 0000000000034206 R08: 0000000000000000 R09: 000000000000000a [ 213.856963] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000534 [ 213.864221] R13: 0000000000000000 R14: 0000000000000032 R15: 00000000000340d7 19:22:24 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() 19:22:25 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x4}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f00000000c0)) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') mknod$loop(0x0, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000001180), 0x0, 0x2}, {&(0x7f0000001280)="baa1f7f5eca0ecaf6653ff44101e8816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f970bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb58de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d1cad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a64f802637", 0xcc, 0x5}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7de0e0dc863e00a26ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f134522ae787cd118a92b51eb1fd8c9067a45e2c3bd01653cabcaa15f413caa653ca2abd03dbb8ecd5cfcd1b23332a667fda0c37f78b10c8f849a79b2a1806c2f3e38df2e370be", 0x8d, 0x9}, {&(0x7f0000000000)="0b4cc265d0d1ff42d3", 0x9, 0x8}], 0x880000, &(0x7f0000001540)=ANY=[@ANYBLOB="687567653d6164766973652c6e725f696e6f6465733d002c687567653d6e657665722c687567653d616c776179732c687567653d6e657665722c6f626a5f726f6c653d23235d7d9aba5a1b7a2e23039f57530a275becb22437589122e64c516701fb11619a44990184fa72ba206dab94d588", @ANYRESDEC=0x0, @ANYBLOB="2c6f636a5f747970673d687567915e6883656569643e72e788d2746016a594a6650403cf17adac91d897c0792b", @ANYRESDEC=0xee00, @ANYBLOB='Jappraise,\x00']) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) dup(r1) getpid() [ 213.871484] Code: 03 42 80 3c 28 00 0f 85 e4 0b 00 00 4d 8b 64 24 18 4d 85 e4 0f 84 01 0c 00 00 e8 0a f0 3b fa 49 8d 7c 24 20 48 89 f8 48 c1 e8 03 <42> 80 3c 28 00 0f 85 db 0b 00 00 49 8b 6c 24 20 48 85 ed 74 b0 [ 213.890643] RIP: kobject_uevent_env+0xb2/0xf40 RSP: ffff8880957ffb28 [ 213.987769] ---[ end trace 1f7dbcc3a7002f11 ]--- [ 213.992737] Kernel panic - not syncing: Fatal exception [ 213.998697] Kernel Offset: disabled [ 214.002313] Rebooting in 86400 seconds..