ting program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:38 executing program 0: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) close(r0) r1 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000140)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) ftruncate(r3, 0x7ffe) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x802, 0x0) sendfile(r4, r3, 0x0, 0x2) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x11, r0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0x526987c9) read(r5, &(0x7f0000000200)=""/250, 0x50c7e3e3) sendfile(r1, r2, 0x0, 0x400000080003) 22:37:38 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:38 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:38 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:38 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:37:39 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:39 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:39 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(0x0, 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:39 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:37:39 executing program 4: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) close(r0) r1 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000140)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) ftruncate(r3, 0x7ffe) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x802, 0x0) sendfile(r4, r3, 0x0, 0x2) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x11, r0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0x526987c9) read(r5, &(0x7f0000000200)=""/250, 0x50c7e3e3) sendfile(r1, r2, 0x0, 0x400000080003) 22:37:39 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', 0x0]) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:39 executing program 4: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) close(r0) r1 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000140)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) ftruncate(r3, 0x7ffe) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x802, 0x0) sendfile(r4, r3, 0x0, 0x2) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x38d) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x11, r0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0x526987c9) read(r5, &(0x7f0000000200)=""/250, 0x50c7e3e3) sendfile(r1, r2, 0x0, 0x400000080003) 22:37:40 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:40 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:37:40 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(0x0, 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:40 executing program 0: socket$unix(0x1, 0x1, 0x0) mkdir(0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x1, 0x9}) fcntl$setlease(r2, 0x400, 0x1) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000380)=0x3) fcntl$getown(r0, 0x9) getsockopt$inet_opts(r1, 0x0, 0x8, 0x0, &(0x7f0000000080)=0x245) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0x82027e) fcntl$setown(r2, 0x8, 0x0) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) unshare(0x40000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) r3 = socket$inet_tcp(0x2, 0x1, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x39) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000000)={{}, {}, 0x8, {0x2, 0x0, @multicast1}, 'bridge_slave_1\x00'}) 22:37:40 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', 0x0]) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:40 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', 0x0]) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:40 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:40 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:40 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:37:40 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(0x0, 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:41 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:41 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', 0x0]) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:41 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', 0x0]) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:41 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:37:41 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:41 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:41 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', 0x0]) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:41 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:41 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:42 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(0x0, 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:42 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:42 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:42 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:37:42 executing program 0: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) close(r0) r1 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000140)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) ftruncate(r3, 0x7ffe) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x802, 0x0) sendfile(r4, r3, 0x0, 0x2) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x38d) pwritev(r2, &(0x7f0000000080)=[{&(0x7f00000000c0)="a8", 0x1}], 0x1, 0x81003) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x11, r0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0x526987c9) read(r5, &(0x7f0000000200)=""/250, 0x50c7e3e3) sendfile(r1, r2, 0x0, 0x400000080003) 22:37:42 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:42 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(0x0, 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:43 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, 0x0, &(0x7f0000000280), 0x0) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:43 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:43 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:37:43 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:43 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:43 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:44 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, 0x0, &(0x7f0000000280), 0x0) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:44 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:37:44 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', 0x0, &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:44 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) 22:37:44 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, 0x0, &(0x7f0000000280), 0x0) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:44 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:45 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(0x0, 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:45 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', 0x0, &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:45 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:45 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:37:45 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), 0x0, 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:45 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', 0x0, &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:45 executing program 4: socket$unix(0x1, 0x1, 0x0) mkdir(0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x1, 0x9}) fcntl$setlease(r2, 0x400, 0x1) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000380)=0x3) fcntl$getown(r0, 0x9) getsockopt$inet_opts(r1, 0x0, 0x8, 0x0, &(0x7f0000000080)=0x245) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0x82027e) fcntl$setown(r2, 0x8, 0x0) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) unshare(0x40000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) r3 = socket$inet_tcp(0x2, 0x1, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x39) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000000)={{}, {}, 0x8, {0x2, 0x0, @multicast1}, 'bridge_slave_1\x00'}) 22:37:45 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), 0x0, 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:45 executing program 0: socket$unix(0x1, 0x1, 0x0) mkdir(0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x1, 0x9}) fcntl$setlease(r2, 0x400, 0x1) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000380)=0x3) fcntl$getown(r0, 0x9) getsockopt$inet_opts(r1, 0x0, 0x8, 0x0, &(0x7f0000000080)=0x245) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0x82027e) fcntl$setown(r2, 0x8, 0x0) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) unshare(0x40000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) r3 = socket$inet_tcp(0x2, 0x1, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x39) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000000)={{}, {}, 0x8, {0x2, 0x0, @multicast1}, 'bridge_slave_1\x00'}) 22:37:45 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(0x0, 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:46 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:37:46 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:46 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(0x0, 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:46 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), 0x0, 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:46 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:46 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:37:47 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(0x0, 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:47 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:47 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:37:47 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:47 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:47 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:48 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x0) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:48 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:48 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:48 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:37:48 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:48 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:48 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:49 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:49 executing program 4: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) close(r0) r1 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000140)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) ftruncate(r3, 0x7ffe) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x802, 0x0) sendfile(r4, r3, 0x0, 0x2) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x38d) pwritev(r2, &(0x7f0000000080)=[{&(0x7f00000000c0)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x11, r0, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0x526987c9) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e3e3) sendfile(r1, r2, 0x0, 0x400000080003) 22:37:49 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:37:49 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', 0x0, &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:49 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:49 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x0) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:49 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:49 executing program 4: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) close(r0) r1 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000140)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) ftruncate(r3, 0x7ffe) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x802, 0x0) sendfile(r4, r3, 0x0, 0x2) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x38d) pwritev(r2, &(0x7f0000000080)=[{&(0x7f00000000c0)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x11, r0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) read(r5, &(0x7f0000000200)=""/250, 0x50c7e3e3) sendfile(r1, r2, 0x0, 0x400000080003) 22:37:49 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', 0x0, &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:49 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, 0x0, 0x0, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:49 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:50 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:37:50 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', 0x0, &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:50 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:50 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x0) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:50 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:50 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:50 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, 0x0, 0x0, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:50 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:50 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:37:51 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:51 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:51 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:51 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, 0x0, 0x0, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:51 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:51 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:51 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:37:51 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:52 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:52 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:52 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:52 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x0, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:52 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:37:52 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', 0x0, &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:52 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:53 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, 0x0, 0x0, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:53 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) 22:37:53 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:37:53 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, 0x0, 0x0, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:53 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x0, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:53 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', 0x0, &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:53 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) 22:37:53 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:37:54 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:54 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:54 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) 22:37:54 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x0, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:54 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', 0x0, &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:54 executing program 4: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) close(r0) r1 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000140)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) ftruncate(r3, 0x7ffe) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x802, 0x0) sendfile(r4, r3, 0x0, 0x2) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x38d) pwritev(r2, &(0x7f0000000080)=[{&(0x7f00000000c0)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x11, r0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) read(r5, &(0x7f0000000200)=""/250, 0x50c7e3e3) sendfile(r1, r2, 0x0, 0x400000080003) 22:37:54 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r2) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r2, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:37:54 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='map_files\x00') exit(0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x51, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x10000, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x1) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000bf) clone(0xfffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x40000004001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000200)="09fb0a3aaaf2cdfa4e1ef57cbbb5fc9b14ab8bc64f6731dc0a31cba8c74383e80b342e85aa150efefd38ea040bc3629774057ca0daf331b60e0b871a1412da9c250b9ec267514b0f0e58d55654413b11fa245f748ee85ea923c9836f21f5d31e7642ff2c01be3afaea4cac92b935d2a60a96120a03849f1b34653100e49191572b8323983eeb125e8ed77ca8a689b5890f984a9f72d011b6d6460073995e76216875a8b9fb8f4b467ad8bb5c7bbf3bdaaf8fdeda76b909c5888f3147bb10b9e2169b0ac45b22aedcd26f9fb9c15f635f0fcf00b9b019bdb739be1774da19", 0xde) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000140)="2f309f78195228eed9bf3dd0b57cfd8aec500c3130f6a28bcca76ea45066aeef02b839c1f1074bc95a817831c3f6902ee7aa1edce7939ba1dfe67542868fc8c2f879117d710d052a2788e7acf5fdc56e95e0f1e114942932616577fc80c8f6b8984f90534a43a1aa020c113b6f74b83e9e3f0b8754df191259a64dd50adff3261887f8e39ddceeec437fe486b01121") tkill(r2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) 22:37:55 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, 0x0, 0x0) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:55 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, 0x0, 0x0) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:55 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:55 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r2) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r2, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:37:55 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x0, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:55 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='map_files\x00') exit(0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x51, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x10000, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x1) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000bf) clone(0xfffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x40000004001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000200)="09fb0a3aaaf2cdfa4e1ef57cbbb5fc9b14ab8bc64f6731dc0a31cba8c74383e80b342e85aa150efefd38ea040bc3629774057ca0daf331b60e0b871a1412da9c250b9ec267514b0f0e58d55654413b11fa245f748ee85ea923c9836f21f5d31e7642ff2c01be3afaea4cac92b935d2a60a96120a03849f1b34653100e49191572b8323983eeb125e8ed77ca8a689b5890f984a9f72d011b6d6460073995e76216875a8b9fb8f4b467ad8bb5c7bbf3bdaaf8fdeda76b909c5888f3147bb10b9e2169b0ac45b22aedcd26f9fb9c15f635f0fcf00b9b019bdb739be1774da19", 0xde) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000140)="2f309f78195228eed9bf3dd0b57cfd8aec500c3130f6a28bcca76ea45066aeef02b839c1f1074bc95a817831c3f6902ee7aa1edce7939ba1dfe67542868fc8c2f879117d710d052a2788e7acf5fdc56e95e0f1e114942932616577fc80c8f6b8984f90534a43a1aa020c113b6f74b83e9e3f0b8754df191259a64dd50adff3261887f8e39ddceeec437fe486b01121") tkill(r2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) 22:37:55 executing program 4: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) close(r0) r1 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000140)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) ftruncate(r3, 0x7ffe) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x802, 0x0) sendfile(r4, r3, 0x0, 0x2) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x38d) pwritev(r2, &(0x7f0000000080)=[{&(0x7f00000000c0)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x11, r0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0x526987c9) read(r5, &(0x7f0000000200)=""/250, 0x50c7e3e3) 22:37:56 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, 0x0, 0x0) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:56 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, 0x0, 0x0) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:56 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r2) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r2, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:37:56 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='map_files\x00') exit(0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x51, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x10000, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x1) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000bf) clone(0xfffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x40000004001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000200)="09fb0a3aaaf2cdfa4e1ef57cbbb5fc9b14ab8bc64f6731dc0a31cba8c74383e80b342e85aa150efefd38ea040bc3629774057ca0daf331b60e0b871a1412da9c250b9ec267514b0f0e58d55654413b11fa245f748ee85ea923c9836f21f5d31e7642ff2c01be3afaea4cac92b935d2a60a96120a03849f1b34653100e49191572b8323983eeb125e8ed77ca8a689b5890f984a9f72d011b6d6460073995e76216875a8b9fb8f4b467ad8bb5c7bbf3bdaaf8fdeda76b909c5888f3147bb10b9e2169b0ac45b22aedcd26f9fb9c15f635f0fcf00b9b019bdb739be1774da19", 0xde) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000140)="2f309f78195228eed9bf3dd0b57cfd8aec500c3130f6a28bcca76ea45066aeef02b839c1f1074bc95a817831c3f6902ee7aa1edce7939ba1dfe67542868fc8c2f879117d710d052a2788e7acf5fdc56e95e0f1e114942932616577fc80c8f6b8984f90534a43a1aa020c113b6f74b83e9e3f0b8754df191259a64dd50adff3261887f8e39ddceeec437fe486b01121") tkill(r2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) 22:37:56 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:56 executing program 0: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) close(r0) r1 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000140)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) ftruncate(r3, 0x7ffe) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x802, 0x0) sendfile(r4, r3, 0x0, 0x2) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x38d) pwritev(r2, &(0x7f0000000080)=[{&(0x7f00000000c0)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x11, r0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0x526987c9) read(r5, &(0x7f0000000200)=""/250, 0x50c7e3e3) 22:37:56 executing program 4: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) close(r0) r1 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000140)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) ftruncate(r3, 0x7ffe) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x802, 0x0) sendfile(r4, r3, 0x0, 0x2) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x38d) pwritev(r2, &(0x7f0000000080)=[{&(0x7f00000000c0)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x11, r0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0x526987c9) read(r5, &(0x7f0000000200)=""/250, 0x50c7e3e3) 22:37:56 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, 0x0, 0x0) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:57 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:57 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, 0x0, 0x0) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:57 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:57 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:57 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:37:57 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x0, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:57 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:58 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:58 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[], 0x0) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:58 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:58 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:37:58 executing program 0: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) close(r0) r1 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000140)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) ftruncate(r3, 0x7ffe) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x802, 0x0) sendfile(r4, r3, 0x0, 0x2) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x38d) pwritev(r2, &(0x7f0000000080)=[{&(0x7f00000000c0)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x11, r0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0x526987c9) read(r5, &(0x7f0000000200)=""/250, 0x50c7e3e3) 22:37:58 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', 0x0, &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:58 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x0, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:58 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:59 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:37:59 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[], 0x0) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:59 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', 0x0, &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:59 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x0, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:59 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[], 0x0) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:59 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[], 0x0) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:37:59 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:00 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:00 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) 22:38:00 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:00 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:00 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) 22:38:00 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', 0x0, &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:00 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:00 executing program 0: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) close(r0) r1 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000140)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) ftruncate(r3, 0x7ffe) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x802, 0x0) sendfile(r4, r3, 0x0, 0x2) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x38d) pwritev(r2, &(0x7f0000000080)=[{&(0x7f00000000c0)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x11, r0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0x526987c9) read(r5, &(0x7f0000000200)=""/250, 0x50c7e3e3) 22:38:00 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:01 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:01 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) 22:38:01 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:01 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:01 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:02 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:02 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:02 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(0x0, &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:02 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:02 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:02 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:02 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x40000000000d0a) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r2) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r1, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r2, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:02 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:02 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:03 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(0x0, &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:03 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x40000000000d0a) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r2) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r1, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r2, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:03 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:03 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', 0x0, &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:03 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:03 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./'], 0x5) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:03 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(0x0, &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:03 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', 0x0, &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:03 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) 22:38:04 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:04 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', 0x0, &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:04 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x40000000000d0a) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r2) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r1, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r2, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:04 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x40000000000d0a) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r2) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r1, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r2, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:04 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:04 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff}) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r2) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r1, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r2, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:04 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:04 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:04 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./'], 0x5) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:05 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', 0x0, &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:05 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) 22:38:05 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff}) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r2) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r1, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r2, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:05 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:05 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:06 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) 22:38:06 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./'], 0x5) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:06 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) 22:38:06 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:06 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:06 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff}) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r2) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r1, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r2, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:06 executing program 4: socket$unix(0x1, 0x1, 0x0) mkdir(0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x2000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x1, 0x9}) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000380)=0x3) fcntl$getown(r0, 0x9) getsockopt$inet_opts(r1, 0x0, 0x8, 0x0, &(0x7f0000000080)=0x245) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0x82027e) fcntl$setown(r2, 0x8, 0x0) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) unshare(0x40000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) r3 = socket$inet_tcp(0x2, 0x1, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x39) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000000)={{}, {}, 0x8, {0x2, 0x0, @multicast1}, 'bridge_slave_1\x00'}) 22:38:06 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:06 executing program 4: socket$unix(0x1, 0x1, 0x0) mkdir(0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x2000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x1, 0x9}) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000380)=0x3) fcntl$getown(r0, 0x9) getsockopt$inet_opts(r1, 0x0, 0x8, 0x0, &(0x7f0000000080)=0x245) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0x82027e) fcntl$setown(r2, 0x8, 0x0) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) unshare(0x40000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) r3 = socket$inet_tcp(0x2, 0x1, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x39) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000000)={{}, {}, 0x8, {0x2, 0x0, @multicast1}, 'bridge_slave_1\x00'}) 22:38:07 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:07 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./fil'], 0x8) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:07 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', 0x0, 0x0, 0x0) 22:38:07 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:07 executing program 2: ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(0xffffffffffffffff, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r1) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r0, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r1, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:07 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', 0x0, &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:07 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:07 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:07 executing program 2: ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(0xffffffffffffffff, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r1) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r0, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r1, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:08 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:08 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', 0x0, 0x0, 0x0) 22:38:08 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) 22:38:08 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./fil'], 0x8) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:08 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', 0x0, &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:08 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:08 executing program 2: ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(0xffffffffffffffff, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r1) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r0, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r1, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:08 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) 22:38:09 executing program 2: pipe(0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(0xffffffffffffffff, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r1) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r0, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r1, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:09 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', 0x0, 0x0, 0x0) 22:38:09 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) 22:38:09 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./fil'], 0x8) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:09 executing program 2: pipe(0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(0xffffffffffffffff, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r1) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r0, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r1, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:09 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', 0x0, &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:09 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:09 executing program 2: pipe(0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(0xffffffffffffffff, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r1) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r0, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r1, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:09 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x0, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:10 executing program 4: socket$unix(0x1, 0x1, 0x0) mkdir(0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x2000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x1, 0x9}) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000380)=0x3) fcntl$getown(r0, 0x9) getsockopt$inet_opts(r1, 0x0, 0x8, 0x0, &(0x7f0000000080)=0x245) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0x82027e) fcntl$setown(r2, 0x8, 0x0) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) unshare(0x40000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) r3 = socket$inet_tcp(0x2, 0x1, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x39) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000000)={{}, {}, 0x8, {0x2, 0x0, @multicast1}, 'bridge_slave_1\x00'}) 22:38:10 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff}) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r2) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r1, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r2, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:10 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file'], 0x9) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:10 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:10 executing program 4: socket$unix(0x1, 0x1, 0x0) mkdir(0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x2000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x1, 0x9}) fcntl$setlease(r2, 0x400, 0x1) fcntl$getown(r0, 0x9) getsockopt$inet_opts(r1, 0x0, 0x8, 0x0, &(0x7f0000000080)=0x245) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0x82027e) fcntl$setown(r2, 0x8, 0x0) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) unshare(0x40000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) r3 = socket$inet_tcp(0x2, 0x1, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x39) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000000)={{}, {}, 0x8, {0x2, 0x0, @multicast1}, 'bridge_slave_1\x00'}) 22:38:10 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x0, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:10 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:11 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff}) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r2) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r1, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r2, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:11 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x0, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:11 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:11 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff}) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r2) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r1, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r2, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:11 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file'], 0x9) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:11 executing program 4: socket$unix(0x1, 0x1, 0x0) mkdir(0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x2000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000300)='\x80C\x8d\x7fZ\xc7Gc\xab\xfb', 0x0) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x1, 0x9}) fcntl$setlease(r2, 0x400, 0x1) fcntl$getown(r0, 0x9) getsockopt$inet_opts(r1, 0x0, 0x8, 0x0, &(0x7f0000000080)=0x245) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0x82027e) fcntl$setown(r2, 0x8, 0x0) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) unshare(0x40000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x6d) r3 = socket$inet_tcp(0x2, 0x1, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x39) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000000)={{}, {}, 0x8, {0x2, 0x0, @multicast1}, 'bridge_slave_1\x00'}) 22:38:11 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:11 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff}) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r2) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r1, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r2, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:11 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1}, 0x2, 0x0) 22:38:12 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:12 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:12 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1}, 0x2, 0x0) 22:38:12 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', 0x0, &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:12 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file'], 0x9) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:12 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:12 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x0, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:13 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:13 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1}, 0x2, 0x0) 22:38:13 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:13 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', 0x0, &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:13 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x0, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:13 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:14 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file'], 0x9) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:14 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:14 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa"}, 0xa, 0x0) 22:38:14 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', 0x0, &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:14 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x0, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:14 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:14 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:15 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:15 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', 0x0, &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:15 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa"}, 0xa, 0x0) 22:38:15 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, 0x0) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:15 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:15 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:15 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:16 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa"}, 0xa, 0x0) 22:38:16 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:16 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:16 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, 0x0) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:16 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:16 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:16 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b0"}, 0xe, 0x0) 22:38:17 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:17 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa"}, 0xa, 0x0) 22:38:17 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[0x0, &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:17 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, 0x0) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:17 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:17 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:17 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:17 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b0"}, 0xe, 0x0) 22:38:17 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:18 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[0x0, &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:18 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:18 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:18 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:18 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b0"}, 0xe, 0x0) 22:38:18 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:19 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:19 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[0x0, &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:19 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:19 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:19 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:19 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460"}, 0x10, 0x0) 22:38:19 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:19 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:19 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:20 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:20 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:20 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(0xffffffffffffffff, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r2) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r1, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r2, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:20 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:20 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460"}, 0x10, 0x0) 22:38:20 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460"}, 0x10, 0x0) 22:38:20 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:21 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(0xffffffffffffffff, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r2) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r1, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r2, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:21 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:21 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(0xffffffffffffffff, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r2) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r1, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r2, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:21 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:21 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460"}, 0x10, 0x0) 22:38:21 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:21 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:21 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:21 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:22 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:22 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:22 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:22 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:22 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:23 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0xffffffffffffffff) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:23 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:23 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:23 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:23 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:23 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(0x0, 0x800) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r2) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r2, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:23 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:23 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:24 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(0x0, 0x800) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r2) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r2, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:24 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0xffffffffffffffff) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:24 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:24 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:24 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:24 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:24 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(0x0, 0x800) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r2) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r2, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:25 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:25 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:25 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0xffffffffffffffff) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:25 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:25 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:25 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:25 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:25 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0xffffffffffffffff) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:26 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:26 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:26 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:26 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:26 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:26 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:27 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:27 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:27 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:27 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:27 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:27 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:27 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:27 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:28 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:28 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:28 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:28 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:28 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:28 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:28 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:28 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:29 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:29 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:29 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:29 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:29 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:29 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:29 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) close(r3) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:29 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:30 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:30 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:30 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:30 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:30 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:30 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:31 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:31 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:31 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:31 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:31 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:31 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:31 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:32 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:32 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:32 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x0) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:32 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:32 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:32 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() close(r3) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:32 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:33 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:33 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:33 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x0) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:33 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:33 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:33 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r3) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:34 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, 0x0, &(0x7f0000000280), 0x0) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:34 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() close(r3) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:34 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:34 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x0) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:34 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:34 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, 0x0, &(0x7f0000000280), 0x0) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:34 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:35 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:35 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() close(r3) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:35 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:35 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(0x0, &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:35 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, 0x0, &(0x7f0000000280), 0x0) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:35 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:36 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:36 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() close(r3) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:36 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:36 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:36 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), 0x0, 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:36 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:36 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140), 0x800) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r2) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:36 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(0x0, &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:37 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:37 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r2) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:37 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), 0x0, 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:37 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r2) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:37 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(0x0, &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:37 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:37 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r2) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:37 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x40000000000d0a) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r1) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:37 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(0x0, &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:37 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x40000000000d0a) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r1) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:38 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), 0x0, 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:38 executing program 1: pipe(&(0x7f0000000100)) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:38 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r3) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:38 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:38 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:38 executing program 1: r0 = creat(0x0, 0x3) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:38 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:38 executing program 1: r0 = creat(0x0, 0x3) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:38 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r3) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:38 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:38 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:38 executing program 1: r0 = creat(0x0, 0x3) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:38 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:38 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r3) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:38 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:39 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:39 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:39 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x3) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:39 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:39 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:39 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x3) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:39 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r3) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:39 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:39 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(0x0, 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:39 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x3) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:39 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:40 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:40 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:40 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r3) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:40 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:40 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:40 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:40 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r3) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:40 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:40 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:40 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:40 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(0x0, 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:40 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:40 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 22:38:41 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, 0x0, 0x0, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:41 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140), 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:41 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 22:38:41 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) 22:38:41 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 22:38:41 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00']) 22:38:41 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:41 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(0x0, 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) 22:38:41 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00']) 22:38:41 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00']) 22:38:41 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00']) 22:38:41 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00']) 22:38:42 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, 0x0, 0x0, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) [ 1288.150367] INFO: task kworker/u4:1:64 blocked for more than 140 seconds. [ 1288.157343] Not tainted 4.14.105+ #27 [ 1288.199042] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. 22:38:42 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140), 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:42 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00']) [ 1288.261695] kworker/u4:1 D26536 64 2 0x80000000 [ 1288.314737] Workqueue: netns cleanup_net [ 1288.335139] Call Trace: [ 1288.356383] ? __schedule+0x91c/0x1f30 [ 1288.391092] ? __sched_text_start+0x8/0x8 [ 1288.402779] ? lock_downgrade+0x5d0/0x5d0 [ 1288.413313] ? lock_acquire+0x10f/0x380 22:38:42 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) 22:38:42 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00']) [ 1288.448555] ? __mutex_lock+0x2c1/0x1430 22:38:42 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00']) 22:38:42 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) [ 1288.483547] schedule+0x92/0x1c0 [ 1288.498186] schedule_preempt_disabled+0x13/0x20 22:38:42 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) [ 1288.558898] __mutex_lock+0x559/0x1430 [ 1288.575070] ? queue_work_on+0x70/0xa0 22:38:42 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000680)) [ 1288.614832] ? cleanup_net+0x136/0x860 [ 1288.637855] ? __ww_mutex_wakeup_for_backoff+0x210/0x210 [ 1288.670591] ? mark_held_locks+0xa6/0xf0 [ 1288.693400] ? cleanup_net+0x136/0x860 22:38:42 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) [ 1288.727266] cleanup_net+0x136/0x860 [ 1288.764239] ? net_drop_ns.part.0+0x70/0x70 [ 1288.799735] ? lock_acquire+0x10f/0x380 [ 1288.829537] process_one_work+0x7c6/0x14e0 [ 1288.870538] ? pwq_dec_nr_in_flight+0x2b0/0x2b0 [ 1288.901396] worker_thread+0x5d7/0x1080 [ 1288.931291] ? process_one_work+0x14e0/0x14e0 [ 1288.957784] kthread+0x310/0x420 [ 1288.982782] ? kthread_create_on_node+0xf0/0xf0 22:38:42 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', 0x0, &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, 0x0, 0x0, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) [ 1289.017634] ret_from_fork+0x3a/0x50 22:38:43 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(0x0, 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000740)=0x1c) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460de"}, 0x11, 0x0) [ 1289.069182] [ 1289.069182] Showing all locks held in the system: [ 1289.135825] 1 lock held by khungtaskd/23: [ 1289.140123] #0: (tasklist_lock){.+.+}, at: [] debug_show_all_locks+0x7c/0x21a [ 1289.149152] 3 locks held by kworker/u4:1/64: [ 1289.153589] #0: ("%s""netns"){+.+.}, at: [] process_one_work+0x6e5/0x14e0 [ 1289.162301] #1: (net_cleanup_work){+.+.}, at: [] process_one_work+0x71b/0x14e0 [ 1289.171431] #2: (net_mutex){+.+.}, at: [] cleanup_net+0x136/0x860 [ 1289.179414] 2 locks held by getty/1754: [ 1289.183408] #0: (&tty->ldisc_sem){++++}, at: [] tty_ldisc_ref_wait+0x22/0x80 [ 1289.192355] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1f7/0x1700 [ 1289.202468] 1 lock held by syz-executor.2/21066: [ 1289.207217] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.215215] 1 lock held by syz-executor.2/21139: [ 1289.219952] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.227976] 1 lock held by syz-executor.1/21145: [ 1289.232743] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.240743] 1 lock held by syz-executor.0/21149: [ 1289.245483] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.253476] 1 lock held by syz-executor.5/21154: [ 1289.258217] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.266214] 1 lock held by syz-executor.1/21203: [ 1289.270980] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.278959] 1 lock held by syz-executor.2/21212: [ 1289.283724] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.291752] 1 lock held by syz-executor.1/21264: [ 1289.296511] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.304501] 1 lock held by syz-executor.0/21268: [ 1289.309243] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.317235] 1 lock held by syz-executor.2/21275: [ 1289.321994] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.329983] 1 lock held by syz-executor.2/21327: [ 1289.334744] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.342774] 1 lock held by syz-executor.5/21405: [ 1289.347516] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.355610] 1 lock held by syz-executor.0/21438: [ 1289.360370] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.368345] 1 lock held by syz-executor.5/21456: [ 1289.373105] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.381102] 1 lock held by syz-executor.1/21457: [ 1289.385840] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.393842] 1 lock held by syz-executor.2/21495: [ 1289.398582] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.406578] 1 lock held by syz-executor.0/21502: [ 1289.411335] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.419309] 1 lock held by syz-executor.1/21517: [ 1289.424523] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.432528] 1 lock held by syz-executor.5/21527: [ 1289.437264] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.445260] 1 lock held by syz-executor.2/21563: [ 1289.449996] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.458007] 1 lock held by syz-executor.2/21607: [ 1289.462765] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.470772] 1 lock held by syz-executor.2/21682: [ 1289.475508] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.483499] 1 lock held by syz-executor.4/21683: [ 1289.488236] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.496316] 1 lock held by syz-executor.0/21709: [ 1289.501074] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.509313] 1 lock held by syz-executor.5/21738: [ 1289.514069] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.522064] 1 lock held by syz-executor.2/21746: [ 1289.526802] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.535048] 1 lock held by syz-executor.0/21784: [ 1289.539790] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.547787] 1 lock held by syz-executor.5/21876: [ 1289.552541] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.560557] 1 lock held by syz-executor.4/21884: [ 1289.565296] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.573292] 1 lock held by syz-executor.0/21916: [ 1289.578031] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.586038] 1 lock held by syz-executor.0/22001: [ 1289.590794] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.598767] 1 lock held by syz-executor.5/22012: [ 1289.603523] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.611519] 1 lock held by syz-executor.2/22017: [ 1289.616272] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.624264] 1 lock held by syz-executor.5/22086: [ 1289.629016] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.637011] 1 lock held by syz-executor.0/22131: [ 1289.641772] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.649750] 1 lock held by syz-executor.2/22154: [ 1289.654506] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.662499] 1 lock held by syz-executor.0/22172: [ 1289.667239] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.675245] 1 lock held by syz-executor.0/22288: [ 1289.680005] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.688000] 1 lock held by syz-executor.5/22299: [ 1289.692766] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.700753] 1 lock held by syz-executor.2/22304: [ 1289.705602] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.713603] 1 lock held by syz-executor.1/22330: [ 1289.718341] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.726335] 1 lock held by syz-executor.0/22341: [ 1289.731106] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.739079] 1 lock held by syz-executor.2/22363: [ 1289.743834] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.751829] 1 lock held by syz-executor.1/22405: [ 1289.756564] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.764554] 1 lock held by syz-executor.0/22408: [ 1289.769302] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.777302] 1 lock held by syz-executor.5/22413: [ 1289.782057] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.790055] 1 lock held by syz-executor.0/22438: [ 1289.794803] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.802793] 1 lock held by syz-executor.2/22439: [ 1289.807529] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.815521] 1 lock held by syz-executor.1/22464: [ 1289.820281] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.828270] 1 lock held by syz-executor.5/22473: [ 1289.833034] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.841026] 1 lock held by syz-executor.2/22496: [ 1289.845762] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.853753] 1 lock held by syz-executor.0/22500: [ 1289.858491] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.866482] 1 lock held by syz-executor.1/22548: [ 1289.871241] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.879220] 1 lock held by syz-executor.5/22592: [ 1289.883983] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.891988] 1 lock held by syz-executor.2/22621: [ 1289.896728] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.904727] 1 lock held by syz-executor.5/22626: [ 1289.909497] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.917485] 1 lock held by syz-executor.1/22644: [ 1289.922254] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.930288] 1 lock held by syz-executor.5/22649: [ 1289.935027] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.943020] 1 lock held by syz-executor.0/22659: [ 1289.947778] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.955774] 1 lock held by syz-executor.5/22672: [ 1289.960543] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.968547] 1 lock held by syz-executor.2/22695: [ 1289.973320] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.981324] 1 lock held by syz-executor.5/22702: [ 1289.986062] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1289.994058] 1 lock held by syz-executor.5/22745: [ 1289.998796] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.006789] 1 lock held by syz-executor.1/22761: [ 1290.011549] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.019519] 1 lock held by syz-executor.5/22769: [ 1290.024273] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.032267] 1 lock held by syz-executor.0/22797: [ 1290.037006] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.045004] 1 lock held by syz-executor.1/22802: [ 1290.049740] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.057729] 1 lock held by syz-executor.5/22819: [ 1290.062502] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.070496] 1 lock held by syz-executor.2/22852: [ 1290.075235] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.083227] 1 lock held by syz-executor.1/22877: [ 1290.087969] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.095958] 1 lock held by syz-executor.5/22902: [ 1290.100723] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.108696] 1 lock held by syz-executor.0/22907: [ 1290.113455] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.121470] 1 lock held by syz-executor.2/22918: [ 1290.126212] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.134201] 1 lock held by syz-executor.1/22942: [ 1290.138939] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.146938] 1 lock held by syz-executor.0/22957: [ 1290.151699] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.159669] 1 lock held by syz-executor.4/22967: [ 1290.164428] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.172418] 1 lock held by syz-executor.2/22982: [ 1290.177154] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.185144] 1 lock held by syz-executor.5/22996: [ 1290.189880] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.197872] 1 lock held by syz-executor.2/23037: [ 1290.202628] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.210661] 1 lock held by syz-executor.0/23057: [ 1290.215422] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.223415] 1 lock held by syz-executor.5/23059: [ 1290.228156] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.236149] 1 lock held by syz-executor.2/23095: [ 1290.240907] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.248882] 1 lock held by syz-executor.0/23112: [ 1290.253639] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.261633] 1 lock held by syz-executor.2/23160: [ 1290.266372] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.274364] 1 lock held by syz-executor.0/23180: [ 1290.279100] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.287092] 1 lock held by syz-executor.1/23199: [ 1290.291850] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.299859] 1 lock held by syz-executor.2/23222: [ 1290.304616] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.312608] 1 lock held by syz-executor.0/23227: [ 1290.317347] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.325336] 1 lock held by syz-executor.5/23230: [ 1290.330092] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.338066] 1 lock held by syz-executor.1/23261: [ 1290.342821] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.350816] 1 lock held by syz-executor.5/23285: [ 1290.355555] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.363569] 1 lock held by syz-executor.2/23304: [ 1290.368305] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.376301] 1 lock held by syz-executor.1/23342: [ 1290.381063] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.389049] 1 lock held by syz-executor.5/23352: [ 1290.393808] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.401803] 1 lock held by syz-executor.0/23399: [ 1290.406540] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.414535] 1 lock held by syz-executor.0/23470: [ 1290.419272] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.427273] 1 lock held by syz-executor.5/23529: [ 1290.432030] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.440028] 1 lock held by syz-executor.0/23538: [ 1290.444768] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.452759] 1 lock held by syz-executor.1/23563: [ 1290.457508] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.465540] 1 lock held by syz-executor.5/23577: [ 1290.470304] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.478280] 1 lock held by syz-executor.0/23627: [ 1290.483040] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.491034] 1 lock held by syz-executor.4/23664: [ 1290.495775] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.503765] 1 lock held by syz-executor.5/23670: [ 1290.508507] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.516501] 1 lock held by syz-executor.0/23671: [ 1290.521258] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.529232] 1 lock held by syz-executor.0/23727: [ 1290.533992] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.541993] 1 lock held by syz-executor.1/23774: [ 1290.546733] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.554742] 1 lock held by syz-executor.1/23827: [ 1290.559488] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.567494] 1 lock held by syz-executor.5/23838: [ 1290.572251] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.580243] 1 lock held by syz-executor.0/23851: [ 1290.584982] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.592989] 1 lock held by syz-executor.1/23896: [ 1290.597724] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.605714] 1 lock held by syz-executor.5/23904: [ 1290.610470] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.618462] 1 lock held by syz-executor.0/23913: [ 1290.623216] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.631210] 1 lock held by syz-executor.4/23947: [ 1290.635947] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.643943] 1 lock held by syz-executor.5/24000: [ 1290.648686] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.656764] 1 lock held by syz-executor.0/24027: [ 1290.661531] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.669510] 1 lock held by syz-executor.1/24043: [ 1290.674266] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.682261] 1 lock held by syz-executor.5/24066: [ 1290.687001] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.695001] 1 lock held by syz-executor.0/24073: [ 1290.699742] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.707754] 1 lock held by syz-executor.5/24159: [ 1290.712518] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.720525] 1 lock held by syz-executor.1/24200: [ 1290.725262] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.733264] 1 lock held by syz-executor.5/24240: [ 1290.738005] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.745997] 1 lock held by syz-executor.1/24264: [ 1290.750756] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.758728] 1 lock held by syz-executor.5/24312: [ 1290.763498] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.771488] 1 lock held by syz-executor.5/24354: [ 1290.776227] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.784240] 1 lock held by syz-executor.0/24378: [ 1290.789009] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.797013] 1 lock held by syz-executor.1/24410: [ 1290.801769] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.809764] 1 lock held by syz-executor.5/24420: [ 1290.814543] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.822535] 1 lock held by syz-executor.0/24442: [ 1290.827272] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.835265] 1 lock held by syz-executor.1/24482: [ 1290.840027] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.847999] 1 lock held by syz-executor.0/24510: [ 1290.852755] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.860753] 1 lock held by syz-executor.1/24550: [ 1290.865492] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.873515] 1 lock held by syz-executor.1/24629: [ 1290.878256] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.886250] 1 lock held by syz-executor.0/24662: [ 1290.891007] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.898985] 1 lock held by syz-executor.0/24722: [ 1290.903747] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.911760] 1 lock held by syz-executor.1/24756: [ 1290.916499] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.924493] 1 lock held by syz-executor.0/24787: [ 1290.929234] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.937229] 1 lock held by syz-executor.5/24819: [ 1290.941992] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.949972] 1 lock held by syz-executor.0/24852: [ 1290.954738] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.962730] 1 lock held by syz-executor.1/24892: [ 1290.967465] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.975453] 1 lock held by syz-executor.0/24942: [ 1290.980212] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1290.988202] 1 lock held by syz-executor.5/25044: [ 1290.992960] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.000959] 1 lock held by syz-executor.1/25104: [ 1291.005702] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.013693] 1 lock held by syz-executor.0/25173: [ 1291.018428] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.026420] 1 lock held by syz-executor.1/25216: [ 1291.031179] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.039153] 1 lock held by syz-executor.4/25303: [ 1291.043913] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.051910] 1 lock held by syz-executor.0/25346: [ 1291.056648] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.064641] 1 lock held by syz-executor.0/25456: [ 1291.069379] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.077390] 1 lock held by syz-executor.5/25564: [ 1291.082150] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.090144] 1 lock held by syz-executor.0/25607: [ 1291.094907] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.102908] 1 lock held by syz-executor.1/25744: [ 1291.107648] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.115642] 1 lock held by syz-executor.0/25778: [ 1291.120400] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.128375] 1 lock held by syz-executor.1/25824: [ 1291.133143] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.141144] 1 lock held by syz-executor.4/25827: [ 1291.145877] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.153977] 1 lock held by syz-executor.5/25898: [ 1291.158719] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.166712] 1 lock held by syz-executor.5/25973: [ 1291.171476] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.179547] 1 lock held by syz-executor.1/25979: [ 1291.184314] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.192301] 1 lock held by syz-executor.5/25993: [ 1291.197042] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.205032] 1 lock held by syz-executor.0/26042: [ 1291.209769] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.217763] 1 lock held by syz-executor.1/26051: [ 1291.222517] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.230523] 1 lock held by syz-executor.0/26113: [ 1291.235263] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.243257] 1 lock held by syz-executor.1/26150: [ 1291.248006] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.256006] 1 lock held by syz-executor.1/26209: [ 1291.260761] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.268734] 1 lock held by syz-executor.0/26271: [ 1291.273490] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.281487] 1 lock held by syz-executor.1/26366: [ 1291.286228] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.294222] 1 lock held by syz-executor.0/26424: [ 1291.298961] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.306984] 1 lock held by syz-executor.1/26433: [ 1291.311738] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.319726] 1 lock held by syz-executor.0/26483: [ 1291.324504] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.332494] 1 lock held by syz-executor.1/26497: [ 1291.337230] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.345224] 1 lock held by syz-executor.0/26632: [ 1291.349962] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.357961] 1 lock held by syz-executor.5/26639: [ 1291.362722] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.370716] 1 lock held by syz-executor.1/26688: [ 1291.375453] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.383456] 1 lock held by syz-executor.0/26704: [ 1291.388196] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.396190] 1 lock held by syz-executor.1/26774: [ 1291.400958] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.408935] 1 lock held by syz-executor.0/26780: [ 1291.413693] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.421688] 1 lock held by syz-executor.1/26850: [ 1291.426700] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.434729] 1 lock held by syz-executor.0/26853: [ 1291.439467] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.447728] 1 lock held by syz-executor.5/26869: [ 1291.452493] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.460496] 1 lock held by syz-executor.0/26917: [ 1291.465231] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.473244] 1 lock held by syz-executor.1/26921: [ 1291.477995] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.485995] 1 lock held by syz-executor.5/26928: [ 1291.490752] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.498723] 1 lock held by syz-executor.1/26967: [ 1291.503483] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.511489] 1 lock held by syz-executor.0/26983: [ 1291.516238] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.524230] 1 lock held by syz-executor.5/27032: [ 1291.528971] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.537214] 1 lock held by syz-executor.1/27111: [ 1291.541988] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.549995] 1 lock held by syz-executor.0/27194: [ 1291.554783] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.562775] 1 lock held by syz-executor.2/27215: [ 1291.567515] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.575508] 1 lock held by syz-executor.5/27248: [ 1291.580265] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.588238] 1 lock held by syz-executor.0/27268: [ 1291.593008] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.601004] 1 lock held by syz-executor.5/27318: [ 1291.605766] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.613757] 1 lock held by syz-executor.0/27335: [ 1291.618499] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.626519] 1 lock held by syz-executor.1/27386: [ 1291.631291] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.639276] 1 lock held by syz-executor.5/27416: [ 1291.644035] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.652045] 1 lock held by syz-executor.5/27510: [ 1291.656781] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.664772] 1 lock held by syz-executor.1/27529: [ 1291.669512] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.677504] 1 lock held by syz-executor.0/27556: [ 1291.682276] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.690295] 1 lock held by syz-executor.4/27591: [ 1291.695053] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.703055] 1 lock held by syz-executor.0/27707: [ 1291.707794] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.715787] 1 lock held by syz-executor.4/27710: [ 1291.720556] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.728529] 1 lock held by syz-executor.0/27760: [ 1291.733281] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.741275] 1 lock held by syz-executor.1/27780: [ 1291.746016] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.754014] 1 lock held by syz-executor.5/27871: [ 1291.758778] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.766792] 1 lock held by syz-executor.0/27922: [ 1291.771551] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.779524] 1 lock held by syz-executor.5/27957: [ 1291.784301] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.792299] 1 lock held by syz-executor.1/28040: [ 1291.797036] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.805021] 1 lock held by syz-executor.1/28118: [ 1291.809755] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.817753] 1 lock held by syz-executor.1/28228: [ 1291.822510] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.830509] 1 lock held by syz-executor.1/28295: [ 1291.835250] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.843242] 1 lock held by syz-executor.5/28319: [ 1291.847989] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.855991] 1 lock held by syz-executor.2/28333: [ 1291.860752] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.868730] 1 lock held by syz-executor.1/28369: [ 1291.873486] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.881660] 1 lock held by syz-executor.5/28402: [ 1291.886398] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.894393] 1 lock held by syz-executor.4/28425: [ 1291.899129] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.907118] 1 lock held by syz-executor.0/28446: [ 1291.911873] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.919847] 1 lock held by syz-executor.5/28460: [ 1291.924607] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.932603] 1 lock held by syz-executor.1/28528: [ 1291.937344] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.945351] 1 lock held by syz-executor.4/28544: [ 1291.950106] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.958092] 1 lock held by syz-executor.5/28634: [ 1291.962853] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.970850] 1 lock held by syz-executor.2/28668: [ 1291.975587] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.983585] 1 lock held by syz-executor.5/28691: [ 1291.988321] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1291.996313] 1 lock held by syz-executor.1/28769: [ 1292.001070] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.009043] 1 lock held by syz-executor.2/28772: [ 1292.013799] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.021795] 1 lock held by syz-executor.5/28802: [ 1292.026551] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.034539] 1 lock held by syz-executor.4/28818: [ 1292.039277] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.047265] 1 lock held by syz-executor.1/28830: [ 1292.052044] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.060067] 1 lock held by syz-executor.2/28833: [ 1292.064808] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.072818] 1 lock held by syz-executor.5/28850: [ 1292.077558] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.085566] 1 lock held by syz-executor.5/28908: [ 1292.090321] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.098294] 1 lock held by syz-executor.2/28944: [ 1292.103055] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.111051] 1 lock held by syz-executor.1/28949: [ 1292.115786] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.123812] 1 lock held by syz-executor.5/28954: [ 1292.128554] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.136546] 1 lock held by syz-executor.4/28960: [ 1292.141302] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.149283] 1 lock held by syz-executor.2/28990: [ 1292.154038] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.162030] 1 lock held by syz-executor.1/29000: [ 1292.166765] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.174757] 1 lock held by syz-executor.4/29016: [ 1292.179493] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.187497] 1 lock held by syz-executor.5/29021: [ 1292.192273] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.200273] 1 lock held by syz-executor.2/29042: [ 1292.205014] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.213015] 1 lock held by syz-executor.1/29045: [ 1292.217767] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.225761] 1 lock held by syz-executor.4/29059: [ 1292.230518] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.238493] 1 lock held by syz-executor.5/29066: [ 1292.243259] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.251254] 1 lock held by syz-executor.2/29083: [ 1292.255991] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.263999] 1 lock held by syz-executor.1/29094: [ 1292.268761] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.276753] 1 lock held by syz-executor.5/29116: [ 1292.281510] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.289483] 1 lock held by syz-executor.1/29146: [ 1292.294238] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.302233] 1 lock held by syz-executor.5/29170: [ 1292.306973] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.314974] 1 lock held by syz-executor.4/29180: [ 1292.319714] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.327706] 1 lock held by syz-executor.1/29200: [ 1292.332467] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.340478] 1 lock held by syz-executor.2/29204: [ 1292.345216] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.353209] 1 lock held by syz-executor.1/29267: [ 1292.357946] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.365955] 1 lock held by syz-executor.2/29290: [ 1292.370729] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.378711] 1 lock held by syz-executor.0/29291: [ 1292.383465] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.391459] 1 lock held by syz-executor.5/29316: [ 1292.396198] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.404265] 1 lock held by syz-executor.2/29335: [ 1292.409000] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.416996] 1 lock held by syz-executor.4/29344: [ 1292.421783] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.430245] 1 lock held by syz-executor.1/29375: [ 1292.434987] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.442982] 1 lock held by syz-executor.2/29384: [ 1292.447724] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.455726] 1 lock held by syz-executor.5/29406: [ 1292.460496] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.468466] 1 lock held by syz-executor.1/29414: [ 1292.473221] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.481213] 1 lock held by syz-executor.2/29438: [ 1292.485959] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.493954] 1 lock held by syz-executor.5/29457: [ 1292.498699] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.506692] 1 lock held by syz-executor.1/29463: [ 1292.511460] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.519443] 1 lock held by syz-executor.2/29464: [ 1292.524197] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.532191] 1 lock held by syz-executor.1/29510: [ 1292.536930] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.544944] 1 lock held by syz-executor.2/29511: [ 1292.549686] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.557678] 1 lock held by syz-executor.5/29512: [ 1292.562435] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.570428] 1 lock held by syz-executor.5/29561: [ 1292.575164] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.583156] 1 lock held by syz-executor.1/29567: [ 1292.587892] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.595892] 1 lock held by syz-executor.0/29588: [ 1292.600668] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.608643] 1 lock held by syz-executor.2/29617: [ 1292.613397] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.621391] 1 lock held by syz-executor.5/29652: [ 1292.626129] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.634137] 1 lock held by syz-executor.1/29653: [ 1292.638874] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.646888] 1 lock held by syz-executor.2/29685: [ 1292.651647] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.659618] 1 lock held by syz-executor.5/29719: [ 1292.664370] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.672373] 1 lock held by syz-executor.2/29762: [ 1292.677112] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.685105] 1 lock held by syz-executor.1/29795: [ 1292.689845] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.697836] 1 lock held by syz-executor.2/29816: [ 1292.702709] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.710721] 1 lock held by syz-executor.1/29836: [ 1292.715463] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.723458] 1 lock held by syz-executor.0/29846: [ 1292.728201] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.736191] 1 lock held by syz-executor.2/29870: [ 1292.740975] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.748947] 1 lock held by syz-executor.5/29874: [ 1292.753714] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.761709] 1 lock held by syz-executor.1/29895: [ 1292.766450] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.774441] 1 lock held by syz-executor.0/29901: [ 1292.779179] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.787173] 1 lock held by syz-executor.2/29923: [ 1292.791932] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.799913] 1 lock held by syz-executor.5/29928: [ 1292.804666] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.812659] 1 lock held by syz-executor.1/29951: [ 1292.817435] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.825466] 1 lock held by syz-executor.5/29983: [ 1292.830226] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.838202] 1 lock held by syz-executor.1/30067: [ 1292.842959] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.850958] 1 lock held by syz-executor.4/30068: [ 1292.855703] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.863693] 1 lock held by syz-executor.5/30133: [ 1292.868433] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.876450] 1 lock held by syz-executor.0/30201: [ 1292.881232] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.889203] 1 lock held by syz-executor.1/30208: [ 1292.893978] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.901977] 1 lock held by syz-executor.5/30233: [ 1292.906718] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.914750] 1 lock held by syz-executor.1/30263: [ 1292.919500] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.927508] 1 lock held by syz-executor.5/30389: [ 1292.932265] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.940258] 1 lock held by syz-executor.2/30402: [ 1292.945008] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.953013] 1 lock held by syz-executor.1/30519: [ 1292.957749] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.965750] 1 lock held by syz-executor.5/30542: [ 1292.970507] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.978494] 1 lock held by syz-executor.0/30558: [ 1292.983250] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1292.991243] 1 lock held by syz-executor.2/30577: [ 1292.995994] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.003987] 1 lock held by syz-executor.1/30578: [ 1293.008724] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.016748] 1 lock held by syz-executor.5/30591: [ 1293.021505] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.029476] 1 lock held by syz-executor.1/30623: [ 1293.034245] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.042241] 1 lock held by syz-executor.0/30667: [ 1293.046983] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.054979] 1 lock held by syz-executor.2/30673: [ 1293.059715] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.067708] 1 lock held by syz-executor.5/30744: [ 1293.072464] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.080467] 1 lock held by syz-executor.1/30783: [ 1293.085211] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.093208] 1 lock held by syz-executor.2/30787: [ 1293.097948] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.105947] 1 lock held by syz-executor.1/30828: [ 1293.110722] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.118721] 1 lock held by syz-executor.5/30838: [ 1293.123490] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.131504] 1 lock held by syz-executor.5/30880: [ 1293.136247] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.144264] 1 lock held by syz-executor.4/30908: [ 1293.149003] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.156997] 1 lock held by syz-executor.5/30916: [ 1293.161752] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.169727] 1 lock held by syz-executor.1/30923: [ 1293.174482] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.182475] 1 lock held by syz-executor.0/30927: [ 1293.187212] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.195213] 1 lock held by syz-executor.2/30947: [ 1293.199982] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.208009] 1 lock held by syz-executor.1/30976: [ 1293.212763] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.220768] 1 lock held by syz-executor.4/31017: [ 1293.225505] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.233494] 1 lock held by syz-executor.1/31023: [ 1293.238231] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.246221] 1 lock held by syz-executor.5/31031: [ 1293.250982] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.258981] 1 lock held by syz-executor.0/31039: [ 1293.263742] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.271735] 1 lock held by syz-executor.2/31067: [ 1293.276469] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.284452] 1 lock held by syz-executor.5/31070: [ 1293.289190] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.297204] 1 lock held by syz-executor.2/31115: [ 1293.301961] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.309940] 1 lock held by syz-executor.1/31173: [ 1293.314701] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.322692] 1 lock held by syz-executor.5/31225: [ 1293.327427] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.335417] 1 lock held by syz-executor.1/31230: [ 1293.340174] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.348144] 1 lock held by syz-executor.2/31241: [ 1293.352906] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.360908] 1 lock held by syz-executor.5/31334: [ 1293.365666] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.373660] 1 lock held by syz-executor.0/31358: [ 1293.378397] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.386389] 1 lock held by syz-executor.1/31370: [ 1293.391270] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.399252] 1 lock held by syz-executor.5/31393: [ 1293.404009] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.412015] 1 lock held by syz-executor.4/31436: [ 1293.416781] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.425015] 1 lock held by syz-executor.5/31456: [ 1293.429765] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.437771] 1 lock held by syz-executor.2/31465: [ 1293.442527] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.450525] 1 lock held by syz-executor.1/31510: [ 1293.455264] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.463266] 1 lock held by syz-executor.5/31527: [ 1293.468007] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.475996] 1 lock held by syz-executor.2/31531: [ 1293.480753] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.488722] 1 lock held by syz-executor.1/31553: [ 1293.493479] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.501473] 1 lock held by syz-executor.1/31614: [ 1293.506214] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.514241] 1 lock held by syz-executor.1/31667: [ 1293.518982] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.526978] 1 lock held by syz-executor.2/31712: [ 1293.532003] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.539994] 1 lock held by syz-executor.1/31719: [ 1293.544754] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.552759] 1 lock held by syz-executor.5/31778: [ 1293.557495] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.565477] 1 lock held by syz-executor.1/31786: [ 1293.570231] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.578214] 1 lock held by syz-executor.2/31802: [ 1293.582972] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.591011] 1 lock held by syz-executor.2/31863: [ 1293.595754] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.603743] 1 lock held by syz-executor.2/32001: [ 1293.608480] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.616468] 1 lock held by syz-executor.5/32008: [ 1293.621226] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.629200] 1 lock held by syz-executor.2/32054: [ 1293.633953] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.641951] 1 lock held by syz-executor.1/32078: [ 1293.646691] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.654678] 1 lock held by syz-executor.1/32141: [ 1293.659432] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.667421] 1 lock held by syz-executor.5/32148: [ 1293.672187] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.680213] 1 lock held by syz-executor.2/32168: [ 1293.684952] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.692948] 1 lock held by syz-executor.2/32212: [ 1293.697689] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.705677] 1 lock held by syz-executor.1/32218: [ 1293.710441] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.718436] 1 lock held by syz-executor.1/32267: [ 1293.723239] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.731248] 1 lock held by syz-executor.2/32277: [ 1293.735990] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.743985] 1 lock held by syz-executor.4/32329: [ 1293.748747] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.756738] 1 lock held by syz-executor.1/32343: [ 1293.761518] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.769508] 1 lock held by syz-executor.2/32348: [ 1293.774263] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.782252] 1 lock held by syz-executor.4/32359: [ 1293.786991] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.794991] 1 lock held by syz-executor.5/32378: [ 1293.799730] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.807729] 1 lock held by syz-executor.2/32410: [ 1293.812487] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.820480] 1 lock held by syz-executor.1/32413: [ 1293.825217] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.833203] 1 lock held by syz-executor.1/32478: [ 1293.837943] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.845949] 1 lock held by syz-executor.2/32510: [ 1293.850711] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.858708] 1 lock held by syz-executor.5/32522: [ 1293.863474] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.871491] 1 lock held by syz-executor.2/32556: [ 1293.876228] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.884221] 1 lock held by syz-executor.1/32566: [ 1293.888961] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.896957] 1 lock held by syz-executor.2/32592: [ 1293.901741] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.909715] 1 lock held by syz-executor.5/32610: [ 1293.914466] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.922455] 1 lock held by syz-executor.2/32620: [ 1293.927192] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.935181] 1 lock held by syz-executor.1/32631: [ 1293.939920] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.947908] 1 lock held by syz-executor.4/32635: [ 1293.952667] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.960657] 1 lock held by syz-executor.2/32660: [ 1293.965391] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.973388] 1 lock held by syz-executor.4/32663: [ 1293.978151] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.986149] 1 lock held by syz-executor.5/32677: [ 1293.990910] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1293.998884] 1 lock held by syz-executor.1/32730: [ 1294.003636] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.011624] 1 lock held by syz-executor.2/32735: [ 1294.016362] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.024377] 1 lock held by syz-executor.5/32751: [ 1294.029114] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.037107] 1 lock held by syz-executor.4/301: [ 1294.041704] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.049702] 1 lock held by syz-executor.2/333: [ 1294.054296] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.062316] 1 lock held by syz-executor.1/379: [ 1294.066882] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.074885] 1 lock held by syz-executor.5/421: [ 1294.079450] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.087450] 1 lock held by syz-executor.2/437: [ 1294.092033] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.100043] 1 lock held by syz-executor.5/492: [ 1294.104697] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.112699] 1 lock held by syz-executor.2/501: [ 1294.117263] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.125280] 1 lock held by syz-executor.2/558: [ 1294.129858] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.137845] 1 lock held by syz-executor.5/575: [ 1294.142432] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.150428] 1 lock held by syz-executor.1/611: [ 1294.155018] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.163012] 1 lock held by syz-executor.5/636: [ 1294.167575] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.175570] 1 lock held by syz-executor.1/673: [ 1294.180153] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.188125] 1 lock held by syz-executor.5/709: [ 1294.192706] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.200713] 1 lock held by syz-executor.1/762: [ 1294.205282] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.213275] 1 lock held by syz-executor.2/851: [ 1294.217837] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.225833] 1 lock held by syz-executor.5/896: [ 1294.230419] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.238403] 1 lock held by syz-executor.1/940: [ 1294.242988] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.250987] 1 lock held by syz-executor.2/945: [ 1294.255554] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.263545] 1 lock held by syz-executor.5/971: [ 1294.268112] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.276101] 1 lock held by syz-executor.2/1020: [ 1294.280773] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.288753] 1 lock held by syz-executor.5/1085: [ 1294.293421] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.301414] 1 lock held by syz-executor.2/1157: [ 1294.306064] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.314055] 1 lock held by syz-executor.2/1178: [ 1294.318706] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.326694] 1 lock held by syz-executor.5/1180: [ 1294.331366] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.339338] 1 lock held by syz-executor.2/1194: [ 1294.344009] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.352005] 1 lock held by syz-executor.1/1217: [ 1294.356659] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.364674] 1 lock held by syz-executor.1/1295: [ 1294.369336] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.377328] 1 lock held by syz-executor.5/1385: [ 1294.382003] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.389981] 1 lock held by syz-executor.2/1421: [ 1294.394668] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.402664] 1 lock held by syz-executor.5/1441: [ 1294.407315] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.415335] 1 lock held by syz-executor.1/1464: [ 1294.420029] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.428008] 1 lock held by syz-executor.2/1555: [ 1294.432706] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.440706] 1 lock held by syz-executor.5/1576: [ 1294.445354] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.453347] 1 lock held by syz-executor.2/1642: [ 1294.457998] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.465998] 1 lock held by syz-executor.5/1663: [ 1294.470668] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.478648] 1 lock held by syz-executor.5/1848: [ 1294.483328] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.491350] 1 lock held by syz-executor.5/1977: [ 1294.496016] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.504013] 1 lock held by syz-executor.5/2020: [ 1294.508663] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.516655] 1 lock held by syz-executor.5/2078: [ 1294.521356] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.529338] 1 lock held by syz-executor.5/2137: [ 1294.534007] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.542009] 1 lock held by syz-executor.5/2193: [ 1294.546662] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.554652] 1 lock held by syz-executor.2/2234: [ 1294.559301] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.567304] 1 lock held by syz-executor.5/2268: [ 1294.571976] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.579949] 1 lock held by syz-executor.5/2321: [ 1294.584620] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.592610] 1 lock held by syz-executor.5/2373: [ 1294.597259] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.605253] 1 lock held by syz-executor.5/2509: [ 1294.609909] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.617907] 1 lock held by syz-executor.5/2595: [ 1294.622580] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.630573] 1 lock held by syz-executor.5/2685: [ 1294.635221] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.643209] 1 lock held by syz-executor.5/2722: [ 1294.647858] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.655858] 1 lock held by syz-executor.2/2744: [ 1294.660528] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.668523] 1 lock held by syz-executor.2/2854: [ 1294.673206] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.681210] 1 lock held by syz-executor.5/2904: [ 1294.685862] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.693863] 1 lock held by syz-executor.4/3047: [ 1294.698514] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.706521] 1 lock held by syz-executor.5/2997: [ 1294.711189] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.719161] 1 lock held by syz-executor.3/3050: [ 1294.723839] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 [ 1294.731835] 1 lock held by syz-executor.1/3041: [ 1294.736487] #0: (&mm->mmap_sem){++++}, at: [] __do_page_fault+0x871/0xb80 [ 1294.745173] 1 lock held by syz-executor.2/3057: [ 1294.749821] #0: (net_mutex){+.+.}, at: [] copy_net_ns+0x156/0x440 22:38:48 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140), 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x3) close(r2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00', &(0x7f00000003c0)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) [ 1294.757812] 1 lock held by syz-executor.1/3064: [ 1294.762478] #0: (&mm->mmap_sem){++++}, at: [] __do_page_fault+0x871/0xb80 [ 1294.771191] [ 1294.772801] ============================================= [ 1294.772801] 22:38:48 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) [ 1294.876800] NMI backtrace for cpu 0 [ 1294.880714] CPU: 0 PID: 23 Comm: khungtaskd Not tainted 4.14.105+ #27 [ 1294.887291] Call Trace: [ 1294.889871] dump_stack+0xb9/0x10e [ 1294.893410] ? irq_force_complete_move+0x2c1/0x2e5 [ 1294.898341] nmi_cpu_backtrace.cold+0x47/0x86 [ 1294.902833] ? irq_force_complete_move.cold+0x7b/0x7b [ 1294.908018] ? nmi_trigger_cpumask_backtrace+0x119/0x147 [ 1294.913466] ? watchdog+0x5d3/0xb60 [ 1294.917094] ? reset_hung_task_detector+0x10/0x10 [ 1294.921933] ? kthread+0x310/0x420 [ 1294.925463] ? kthread_create_on_node+0xf0/0xf0 [ 1294.930127] ? ret_from_fork+0x3a/0x50 [ 1294.934062] Sending NMI from CPU 0 to CPUs 1: [ 1294.938963] NMI backtrace for cpu 1 [ 1294.938967] CPU: 1 PID: 3053 Comm: syz-executor.1 Not tainted 4.14.105+ #27 [ 1294.938970] task: ffff88808859de00 task.stack: ffff8880885a0000 [ 1294.938985] RIP: 0010:native_apic_mem_write+0x8/0x10 [ 1294.938988] RSP: 0018:ffff8881dbb07ef0 EFLAGS: 00000046 [ 1294.938994] RAX: ffffffff9789ac10 RBX: ffffffff99ac2880 RCX: 0000000000000020 22:38:48 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x40000000000d0a) read(r0, &(0x7f0000000140)=""/250, 0x10000032c) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() pipe2(&(0x7f00000000c0), 0x84800) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x3, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') socket$netlink(0x10, 0x3, 0xf) socket$netlink(0x10, 0x3, 0x2) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[0x0, &(0x7f0000000340)='+\x00', &(0x7f0000000380)='ns/net\x00'], &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', &(0x7f00000004c0)='ns/net\x00', &(0x7f0000000500)='wlan0%trusted&\x00', &(0x7f0000000540)='ns/net\x00', &(0x7f0000000580)='ns/net\x00', &(0x7f00000005c0)='cgroupmd5sumeth1\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='nodev\\selinux^,}\x00']) getsockname$inet6(r2, &(0x7f0000000700)={0xa, 0x0, 0x0, @empty}, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x8) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) recvfrom$inet(r3, &(0x7f0000000300)=""/12, 0xc, 0x40, &(0x7f0000000780)={0x2, 0x4e20, @loopback}, 0x10) unshare(0x40000000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x1, "f4c6d5d9c5c925fa947915b08460decc"}, 0x12, 0x0) [ 1294.938997] RDX: 1ffffffff335852d RSI: 00000000000000be RDI: 0000000000000380 [ 1294.939001] RBP: ffff8881dbb1df40 R08: ffff88821ffff05c R09: ffff88821ffff048 [ 1294.939004] R10: ffff88821ffff050 R11: 0000012e58bd12a8 R12: 00000000000000be [ 1294.939008] R13: 0000000000000003 R14: 0000012d805a250c R15: ffff8881dbb24b28 [ 1294.939011] FS: 00007f953e0ab700(0000) GS:ffff8881dbb00000(0000) knlGS:0000000000000000 [ 1294.939014] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1294.939018] CR2: 00007f5f25b6c000 CR3: 000000009aa9e006 CR4: 00000000001606a0 [ 1294.939020] Call Trace: [ 1294.939021] [ 1294.939024] lapic_next_event+0x59/0x90 [ 1294.939026] clockevents_program_event+0x1fd/0x2e0 [ 1294.939029] tick_program_event+0x78/0xd0 [ 1294.939031] hrtimer_interrupt+0x20b/0x490 [ 1294.939034] smp_apic_timer_interrupt+0x136/0x620 [ 1294.939036] apic_timer_interrupt+0x84/0x90 [ 1294.939038] [ 1294.939041] RIP: 0010:unmap_page_range+0x78b/0x12f0 [ 1294.939043] RSP: 0018:ffff8880885a78b0 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff10 [ 1294.939049] RAX: 1ffff11013da6f60 RBX: 0000000000000627 RCX: 0000000000040000 [ 1294.939052] RDX: ffffffff814c5596 RSI: ffffc90004d6d000 RDI: ffff8880a2a3900c [ 1294.939056] RBP: 00007f953e760000 R08: 0000000000000001 R09: 0000000000000001 [ 1294.939059] R10: ffff88808859e658 R11: 0000000000000001 R12: 80000001a72f8007 [ 1294.939062] R13: ffffea00069cbdc0 R14: dffffc0000000000 R15: ffff88809ed37b00 [ 1294.939065] ? _vm_normal_page+0x2f0/0x2f0 [ 1294.939067] unmap_single_vma+0x118/0x170 [ 1294.939069] unmap_vmas+0x43/0xa0 [ 1294.939071] exit_mmap+0x213/0x440 [ 1294.939074] ? trace_hardirqs_on_caller+0x37b/0x540 [ 1294.939076] ? SyS_munmap+0x30/0x30 [ 1294.939079] ? exit_aio+0x232/0x300 [ 1294.939081] ? ___might_sleep+0x160/0x280 [ 1294.939083] mmput+0xc8/0x350 [ 1294.939085] copy_process.part.0+0x378c/0x6520 [ 1294.939088] ? __cleanup_sighand+0x40/0x40 [ 1294.939090] _do_fork+0x193/0xcc0 [ 1294.939092] ? fork_idle+0x260/0x260 [ 1294.939095] ? SyS_clock_gettime+0x7d/0xe0 [ 1294.939097] ? do_clock_gettime+0xd0/0xd0 [ 1294.939099] ? do_syscall_64+0x43/0x4b0 [ 1294.939102] ? sys_vfork+0x20/0x20 [ 1294.939104] do_syscall_64+0x19b/0x4b0 [ 1294.939107] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1294.939108] Code: 83 3d 4c 99 da 02 01 77 02 5d c3 89 ef 5d e9 71 e7 fe ff 48 c7 c7 40 45 64 9a e8 b4 e9 48 00 eb df 66 90 89 ff 89 b7 00 d0 5f ff 0f 1f 80 00 00 00 00 48 b8 00 00 00 00 00 fc ff df 53 89 fb [ 1295.000183] Kernel panic - not syncing: hung_task: blocked tasks [ 1295.207193] CPU: 0 PID: 23 Comm: khungtaskd Not tainted 4.14.105+ #27 [ 1295.213759] Call Trace: [ 1295.216341] dump_stack+0xb9/0x10e [ 1295.219871] panic+0x1d9/0x3c2 [ 1295.223051] ? add_taint.cold+0x16/0x16 [ 1295.227026] ? irq_force_complete_move.cold+0x7b/0x7b [ 1295.232222] ? ___preempt_schedule+0x16/0x18 [ 1295.236629] watchdog+0x5e4/0xb60 [ 1295.240089] ? reset_hung_task_detector+0x10/0x10 [ 1295.244937] kthread+0x310/0x420 [ 1295.248292] ? kthread_create_on_node+0xf0/0xf0 [ 1295.252966] ret_from_fork+0x3a/0x50 [ 1295.256988] Kernel Offset: 0x16800000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 1295.267929] Rebooting in 86400 seconds..